Sciweavers

2778 search results - page 18 / 556
» Limit complexities revisited
Sort
View
ISORC
2005
IEEE
15 years 3 months ago
Revisiting COTS middleware for DRE systems
Distributed Real-Time Embedded systems (DRE) increasingly rely on COTS middleware to meet their distribution needs. Yet, there is a technology gap between the design of COTS middl...
Jérôme Hugues, Laurent Pautet, Fabric...
HT
2000
ACM
15 years 2 months ago
Hypertext interaction revisited
Much of hypertext narrative relies on links to shape a reader’s interaction with the text. But links may be too limited to express ambiguity, imprecision, and entropy, or to adm...
Gene Golovchinsky, Catherine C. Marshall
FC
2006
Springer
97views Cryptology» more  FC 2006»
15 years 1 months ago
Privacy-Protecting Coupon System Revisited
Abstract. At FC'05, Chen et al. introduced an elegant privacy protecting coupon (PPC) system, CESSS05 [13], in which users can purchase multi-coupons and redeem them unlinkabl...
Lan Nguyen
FSE
2006
Springer
121views Cryptology» more  FSE 2006»
15 years 1 months ago
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographi...
John Black
TCS
2008
14 years 9 months ago
Generalized approximate counting revisited
A large class of q-distributions is defined on the stochastic model of Bernoulli trials in which the probability of success (=advancing to the next level) depends geometrically on...
Guy Louchard, Helmut Prodinger