Sciweavers

20175 search results - page 3889 / 4035
» Is abstraction the key to computing
Sort
View
106
Voted
EUROCRYPT
2001
Springer
15 years 5 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
INDOCRYPT
2001
Springer
15 years 5 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
120
Voted
LPNMR
2001
Springer
15 years 5 months ago
plp: A Generic Compiler for Ordered Logic Programs
Abstract This paper describes a generic compiler, called plp, for translating ordered logic programs into standard logic programs under the answer set semantics. In an ordered logi...
James P. Delgrande, Torsten Schaub, Hans Tompits
CLUSTER
2000
IEEE
15 years 5 months ago
Partition Repositories for Partition Cloning - OS Independent Software Maintenance in Large Clusters of PCs
As a novel approach to software maintenance in large clusters of PCs requiring multiple OS installations we implemented partition cloning and partition repositories as well as a s...
Felix Rauch, Christian Kurmann, Thomas Stricker
123
Voted
ICNP
2000
IEEE
15 years 5 months ago
An Image Transport Protocol for the Internet
Images account for a significant and growing fraction of Web downloads. The traditional approach to transporting images uses TCP, which provides a generic reliable, in-order eam ...
Suchitra Raman, Hari Balakrishnan, Murari Srinivas...
« Prev « First page 3889 / 4035 Last » Next »