Sciweavers

1512 search results - page 235 / 303
» When Suboptimal Rules
Sort
View
85
Voted
EUROCRYPT
1997
Springer
15 years 4 months ago
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when no...
Eric R. Verheul, Henk C. A. van Tilborg
ICLP
1997
Springer
15 years 4 months ago
Parallel Evaluation Strategies for Functional Logic Languages
We introduce novel, sound, complete, and locally optimal evaluation strategies for functional logic programming languages. Our strategies combine, in a non-trivial way, two landma...
Sergio Antoy, Rachid Echahed, Michael Hanus
90
Voted
HT
1993
ACM
15 years 4 months ago
Links in Hypermedia: The Requirement for Context
Taking the concept of a link from hypertext and adding to it the rich collection of information formats found in multimedia systems provides an extension to hypertext that is ofte...
Lynda Hardman, Dick C. A. Bulterman, Guido van Ros...
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
15 years 4 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
146
Voted
ECOOPW
1998
Springer
15 years 4 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea