Sciweavers

3134 search results - page 357 / 627
» Computing full disjunctions
Sort
View
EUROCRYPT
1999
Springer
15 years 5 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
93
Voted
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 5 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
99
Voted
OOPSLA
1998
Springer
15 years 5 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken
ICRA
1993
IEEE
147views Robotics» more  ICRA 1993»
15 years 4 months ago
Towards Sonar Based Perception and Modelling for Unmanned Untethered Underwater Vehicles
The ability to automatically generate internal models from sensed data will be of critical importance in the development of flexible, adaptive and useful unmanned underwater vehic...
B. Steer, J. Kloske, P. Garner, L. LeBlanc, S. Sch...
85
Voted
LICS
1990
IEEE
15 years 4 months ago
Extensional PERs
In the paper "Extensional PERs" by P. Freyd, P. Mulry, G. Rosolini and D. Scott, a category C of "pointed complete extensional PERs" and computable maps is int...
Peter J. Freyd, P. Mulry, Giuseppe Rosolini, Dana ...