Sciweavers

4498 search results - page 744 / 900
» How to Invent Functions
Sort
View
119
Voted
SACMAT
2003
ACM
15 years 9 months ago
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Patrick Drew McDaniel
138
Voted
VRML
2003
ACM
15 years 9 months ago
A multi-user virtual environment system with extensible animations
Multi-user virtual environment (MUVE) systems integrate the technologies of virtual reality and distributed system to allow users to interact with each other in a realistic virtua...
Yi-Lin Liu, Tsai-Yen Li
132
Voted
BTW
2003
Springer
118views Database» more  BTW 2003»
15 years 9 months ago
Information System Architectures: From Art to Science
: The presentation claims that architectural design plays a crucial role in system development as a first step in a process that turns a requirements specification into a working s...
Peter C. Lockemann
138
Voted
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
133
Voted
EMO
2003
Springer
86views Optimization» more  EMO 2003»
15 years 9 months ago
No Free Lunch and Free Leftovers Theorems for Multiobjective Optimisation Problems
Abstract. The classic NFL theorems are invariably cast in terms of single objective optimization problems. We confirm that the classic NFL theorem holds for general multiobjective ...
David Corne, Joshua D. Knowles