Sciweavers

2055 search results - page 355 / 411
» Generic Model Refactorings
Sort
View
ASIACRYPT
2001
Springer
15 years 6 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
CP
2001
Springer
15 years 6 months ago
Solving Disjunctive Constraints for Interactive Graphical Applications
In interactive graphical applications we often require that objects do not overlap. Such non-overlap constraints can be modelled as disjunctions of arithmetic inequalities. Unfortu...
Kim Marriott, Peter Moulder, Peter J. Stuckey, Ala...
EUROCAST
2001
Springer
118views Hardware» more  EUROCAST 2001»
15 years 6 months ago
A Language Prototyping Tool Based on Semantic Building Blocks
We present a Language Prototyping System that facilitates the modular development of interpreters from semantic specifications. The theoretical basis of our system is the integrat...
José Emilio Labra Gayo, Juan Manuel Cueva L...
DEXA
2000
Springer
99views Database» more  DEXA 2000»
15 years 6 months ago
The BORD Benchmark for Object-Relational Databases
This paper describes a new benchmark for object-relational DBMSs, the Benchmark for Object-Relational Databases (BORD). BORD has been developed to evaluate system performance pecul...
Sang Ho Lee, Sung Jin Kim, Won Kim
METRICS
1999
IEEE
15 years 6 months ago
Measurements Should Generate Value, Rather than Data
Success factors for measurement programs as identified in the literature typically focus on the `internals' of the measurement program: incremental implementation, support fr...
Frank Niessink, Hans van Vliet