Sciweavers

464 search results - page 15 / 93
» Enjoy the Paper: Lexicology
Sort
View
IEEECIT
2005
IEEE
15 years 3 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
IV
2005
IEEE
83views Visualization» more  IV 2005»
15 years 3 months ago
Interactive 3D Environments by Using Videogame Engines
In this paper we study the technologies that are available for interactive and cooperative 3D environments. In particular, we describe how state-of-the art videogame 3D engines ca...
Roberto Andreoli, Rosario De Chiara, Ugo Erra, Vit...
107
Voted
LICS
2005
IEEE
15 years 3 months ago
Eager Normal Form Bisimulation
This paper describes two new bisimulation equivalences for the pure untyped call-by-value λ-calculus, called enf bisimilarity and enf bisimilarity up to η. They are based on eag...
Soren Lassen
LPAR
2005
Springer
15 years 3 months ago
Termination of Fair Computations in Term Rewriting
Abstract. The main goal of this paper is to apply rewriting termination technology —enjoying a quite mature set of termination results and tools— to the problem of proving auto...
Salvador Lucas, José Meseguer
APLAS
2004
ACM
15 years 3 months ago
Network Fusion
Modular programming enjoys many well-known advantages: readability, maintainability, separate development and compilation. However, the composition of modular units (components) s...
Pascal Fradet, Stéphane Hong Tuan Ha