Sciweavers

1628 search results - page 219 / 326
» Compiler Construction Using Scheme
Sort
View
PSLS
1995
15 years 8 months ago
Lazy Remote Procedure Call and its Implementation in a Parallel Variant of C
Abstract. Lazy task creation (LTC) is an e cient approach for executing divide and conquer parallel programs that has been used in the implementation of Multilisp's future con...
Marc Feeley
IJISMD
2010
135views more  IJISMD 2010»
15 years 2 months ago
On the Usage of Labels and Icons in Business Process Modeling
The value of business process models is dependent not only on the choice of graphical elements in the model, but also on their annotation with additional textual and graphical inf...
Jan Mendling, Jan Recker, Hajo A. Reijers
187
Voted
IACR
2011
130views more  IACR 2011»
14 years 4 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 10 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...