Sciweavers

206 search results - page 29 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
134
Voted
CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
15 years 4 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali
PODC
1993
ACM
15 years 4 months ago
A Lower Bound on Wait-Free Counting
A counting protocol (mod m) consists of shared memory bits - referred to as the counter - and of a procedure for incrementing the counter value by 1 (mod m). The procedure may be ...
Shlomo Moran, Gadi Taubenfeld
108
Voted
EDUTAINMENT
2007
Springer
15 years 4 months ago
A 3D Virtual Learning Environment to Foster Communication for Long Term Ill Children
In this paper, we present a virtual learning environment which supports the learning process of long term sick children. By focusing on 3D Virtual Environments technology chronical...
Fabian Di Fiore, Pieter Jorissen, Gert Vansichem, ...
EUROCRYPT
2000
Springer
15 years 4 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
101
Voted
GECCO
2000
Springer
153views Optimization» more  GECCO 2000»
15 years 4 months ago
Applying Genetic Algorithms to Multi-Objective Land Use Planning
This paper explores the application of multiobjective Genetic Algorithms (mGAs) to rural land use planning, a spatial allocation problem. Two mGAs are proposed. Both share an unde...
Keith B. Matthews, Susan Craw, Stewart Elder, Alan...