Sciweavers

7623 search results - page 1311 / 1525
» Constructive Volume Modeling
Sort
View
ASIACRYPT
2001
Springer
15 years 8 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
CAV
2001
Springer
83views Hardware» more  CAV 2001»
15 years 8 months ago
Iterating Transducers
Regular languages have proved useful for the symbolic state exploration of infinite state systems. They can be used to represent infinite sets of system configurations; the tran...
Dennis Dams, Yassine Lakhnech, Martin Steffen
OOPSLA
2001
Springer
15 years 8 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
TACAS
2001
Springer
119views Algorithms» more  TACAS 2001»
15 years 8 months ago
Compositional Message Sequence Charts
Abstract. A message sequence chart (MSC) is a standard notation for describing the interaction between communicating objects. It is popular among the designers of communication pro...
Elsa L. Gunter, Anca Muscholl, Doron Peled
COOPIS
2000
IEEE
15 years 8 months ago
An Extensible Business Communication Language
Abstract. A main problem for electronic commerce, particularly for businessto-business applications, lies in the need for the involved information systems to meaningfully exchange ...
Hans Weigand, Wilhelm Hasselbring
« Prev « First page 1311 / 1525 Last » Next »