Sciweavers

206 search results - page 22 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
122
Voted
COMPSEC
2004
99views more  COMPSEC 2004»
15 years 10 days ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
CONCURRENCY
2000
99views more  CONCURRENCY 2000»
15 years 9 days ago
The Java memory model is fatally flawed
The Java memory model described in Chapter 17 of the Java Language Specification gives constraints on how threads interact through memory. This chapter is hard to interpret and po...
William Pugh
98
Voted
APIN
1999
102views more  APIN 1999»
15 years 5 days ago
Constructing Information Bases Using Associative Structures
We present an approach based on knowledge medium using associative structures as a framework of information representation to gather raw information from heterogeneous information...
Harumi Maeda, Kazuto Koujitani, Toyoaki Nishida
78
Voted
BMCBI
2002
76views more  BMCBI 2002»
15 years 9 days ago
The SGS3 protein involved in PTGS finds a family
Background: Post transcriptional gene silencing (PTGS) is a recently discovered phenomenon that is an area of intense research interest. Components of the PTGS machinery are being...
Alex Bateman
WDAG
2005
Springer
157views Algorithms» more  WDAG 2005»
15 years 6 months ago
(Almost) All Objects Are Universal in Message Passing Systems
d Abstract) Carole Delporte-Gallet1 , Hugues Fauconnier2 , and Rachid Guerraoui3 1 ESIEE-IGM Marne-La-Vallee, France 2 LIAFA Univ Paris VII, France 3 EPFL Lausanne, Switzerland Thi...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...