Sciweavers

6434 search results - page 860 / 1287
» Model Transformations with Reference Models
Sort
View
EUROCRYPT
2003
Springer
15 years 10 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
154
Voted
COGNITIVE
2001
Springer
15 years 9 months ago
Virtual Reality and Cognitive Processes
The relationship between our actions and their perceivable results is ruled by what we call the laws of nature. It is general understanding that our actions act upon real objects ...
Olaf Diettrich
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
PPSN
1994
Springer
15 years 9 months ago
RPL2: A Language and Parallel Framework for Evolutionary Computing
The Reproductive Plan Language 2 (RPL2) is an extensible interpreted language for writing and using evolutionary computing programs. It supports arbitrary genetic representations,...
Patrick D. Surry, Nicholas J. Radcliffe
AIED
2007
Springer
15 years 9 months ago
Evaluating a Collaborative Constraint-based Tutor for UML Class Diagrams
COLLECT-UML is a collaborative constraint-based tutor for teaching object-oriented analysis and design using Unified Modelling Language. It is the first system in the family of con...
Nilufar Baghaei, Antonija Mitrovic