Sciweavers

2250 search results - page 160 / 450
» Authorizing applications in singularity
Sort
View
EJC
2006
14 years 10 months ago
3-star factors in random d-regular graphs
The small subgraph conditioning method first appeared when Robinson and the second author showed the almost sure hamiltonicity of random d-regular graphs. Since then it has been u...
Hilda Assiyatun, Nicholas C. Wormald
ENVSOFT
2006
118views more  ENVSOFT 2006»
14 years 10 months ago
Database architectures: Current trends and their relationships to environmental data management
Ever increasing environmental demands from customers, authorities and governmental organizations as well as new business control functions are integrated to environmental manageme...
Jaroslav Pokorný
78
Voted
IJNSEC
2008
106views more  IJNSEC 2008»
14 years 10 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
ENTCS
2007
104views more  ENTCS 2007»
14 years 10 months ago
General Reversibility
The first and the second author introduced reversible ccs (rccs) in order to model concurrent computations where certain actions are allowed to be reversed. Here we t the core of...
Vincent Danos, Jean Krivine, Pawel Sobocinski
67
Voted
CACM
2004
88views more  CACM 2004»
14 years 10 months ago
Natural development of ubiquitous interfaces
ent through the use of meaningful abstractions in order to avoid dealing with low-level details. Despite this potential benefit, their adoption has mainly been limited to professio...
Silvia Berti, Fabio Paternò, Carmen Santoro