Sciweavers

43264 search results - page 8323 / 8653
» Comparing models of computation
Sort
View
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
15 years 1 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
PVLDB
2010
97views more  PVLDB 2010»
15 years 1 months ago
Ranking Continuous Probabilistic Datasets
Ranking is a fundamental operation in data analysis and decision support, and plays an even more crucial role if the dataset being explored exhibits uncertainty. This has led to m...
Jian Li, Amol Deshpande
RSA
2010
89views more  RSA 2010»
15 years 1 months ago
Some remarks on Betti numbers of random polygon spaces
Polygon spaces like Mℓ = {(u1, · · · , un) ∈ S1 × · · · S1 ; n i=1 liui = 0}/SO(2) or they three dimensional analogues Nℓ play an important rle in geometry and topolo...
Clément Dombry, Christian Mazza
RULEML
2010
Springer
15 years 1 months ago
Transformation of SBVR Compliant Business Rules to Executable FCL Rules
 The  main  source  of  changing  requirements  of  the  dynamic  business   environment  is  response  to  changes  in  regulations  and  contracts  towards  ...
Aqueo Kamada, Guido Governatori, Shazia Wasim Sadi...
SEKE
2010
Springer
15 years 1 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
« Prev « First page 8323 / 8653 Last » Next »