Sciweavers

10625 search results - page 1783 / 2125
» Supporting delay-intolerant applications
Sort
View
WPES
2003
ACM
15 years 4 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
ADC
2003
Springer
106views Database» more  ADC 2003»
15 years 4 months ago
Database Component Ware
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, con...
Bernhard Thalheim
AGTIVE
2003
Springer
15 years 4 months ago
Integrating Graph Rewriting and Standard Software Tools
OptimixJ is a graph rewrite tool that can be embedded easily into the standard software process. Applications and models can be developed in Java or UML and extended by graph rewri...
Uwe Aßmann, Johan Lövdahl
CCS
2003
ACM
15 years 4 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
80
Voted
ERSHOV
2003
Springer
15 years 4 months ago
Data Mappings in the Model-View-Controller Pattern
The model-view-controller pattern is used to keep a data model and its views consistent. Usually there is a one-to-one correspondence between the data in the model and its represen...
Martin Rammerstorfer, Hanspeter Mössenbö...
« Prev « First page 1783 / 2125 Last » Next »