Sciweavers

1980 search results - page 113 / 396
» On the Associative Nijenhuis Relation
Sort
View
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 7 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
INTELLCOMM
2004
Springer
15 years 7 months ago
On Using WS-Policy, Ontology, and Rule Reasoning to Discover Web Services
This paper proposes an approach to behaviour-based discovery of Web Services by which business rules that govern service behaviour are described as a policy. The policy is represen...
Natenapa Sriharee, Twittie Senivongse, Kunal Verma...
LOPSTR
2004
Springer
15 years 7 months ago
Proving Termination for Logic Programs by the Query-Mapping Pairs Approach
This paper describes a method for proving termination of to logic programs based on abstract interpretation. The method ry-mapping pairs to abstract the relation between calls in t...
Naomi Lindenstrauss, Yehoshua Sagiv, Alexander Ser...
PATAT
2004
Springer
135views Education» more  PATAT 2004»
15 years 7 months ago
A Column Generation Scheme for Faculty Timetabling
In this paper we deal with the problem of building a timetable for the courses of a university faculty. We propose an integer linear programming approach based on column generation...
Andrea Qualizza, Paolo Serafini
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 7 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng