Sciweavers

11345 search results - page 2035 / 2269
» Foundations of Computer Science
Sort
View
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 7 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
POS
1998
Springer
15 years 7 months ago
Spatio-temporal Access in Persistent Java
Persistent programming languages are targetted primarily at application systems involving complex data structures and relationships, as typi ed by Geographical Information Systems...
Sonia Berman, R. Southern, A. Vasey, D. Ziskind
ESEC
1997
Springer
15 years 7 months ago
Developing Multimedia Applications with the WinWin Spiral Model
Fifteen teams recently used the WinWin Spiral Model to perform the system engineering and architecting of a set of multimedia applications for the USC Library Information Systems....
Barry W. Boehm, Alexander Egyed, Julie Kwan, Raymo...
ICALP
1997
Springer
15 years 7 months ago
The Theory of Vaccines
Despite the major role that modularity occupies in computer science, all the known results on modular analysis only treat particular problems, and there is no general unifying the...
Massimo Marchiori
TACS
1997
Springer
15 years 7 months ago
Optimal Representations of Polymorphic Types with Subtyping (Extended Abstract)
d Abstract) Alexander Aiken1 and Edward L. Wimmers2 and Jens Palsberg3 1 EECS Department, University of California at Berkeley, Berkeley, CA 94720-1776. 2 IBM Almaden Research Cent...
Alexander Aiken, Edward L. Wimmers, Jens Palsberg
« Prev « First page 2035 / 2269 Last » Next »