Sciweavers

3318 search results - page 340 / 664
» The Weak Instance Model
Sort
View
EUROCRYPT
2004
Springer
15 years 10 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
115
Voted
HOTOS
2003
IEEE
15 years 10 months ago
Why Events Are a Bad Idea (for High-Concurrency Servers)
Event-based programming has been highly touted in recent years as the best way to write highly concurrent applications. Having worked on several of these systems, we now believe t...
J. Robert von Behren, Jeremy Condit, Eric A. Brewe...
138
Voted
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 10 months ago
Toward an Understanding of Creative Solution Generation
Researchers have sought a better understanding of creativity for more than a century and the resulting investigations have shed a great deal of light on the subject of creativity....
Eric L. Santanen, Robert O. Briggs, Gert-Jan de Vr...
IPPS
2002
IEEE
15 years 10 months ago
Failure Behavior Analysis for Reliable Distributed Embedded Systems
Failure behavior analysis is a very important phase in developing large distributed embedded systems with weak safety requirements which do graceful degradation in case of failure...
Mario Trapp, Bernd Schürmann, Torsten Tettero...
ICFEM
2009
Springer
15 years 9 months ago
An Empirical Study of Structural Constraint Solving Techniques
Structural constraint solving allows finding object graphs that satisfy given constraints, thereby enabling software reliability tasks, such as systematic testing and error recove...
Junaid Haroon Siddiqui, Sarfraz Khurshid