Sciweavers

200 search results - page 27 / 40
» A Core Calculus for Provenance
Sort
View
158
Voted
CCS
2010
ACM
15 years 14 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
179
Voted
POPL
1989
ACM
15 years 7 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
129
Voted
IJCAI
1993
15 years 5 months ago
The Range of Applicability of Nonmonotonic Logics for the Inertia Problem
We introduce and use a new methodology for the study of logics for action and change. The methodology allows one to define a taxonomy of reasoning problems, based in particular on...
Erik Sandewall
144
Voted
SIAMNUM
2011
154views more  SIAMNUM 2011»
14 years 10 months ago
Continuous Mesh Framework Part I: Well-Posed Continuous Interpolation Error
In the context of mesh adaptation, Riemannian metric spaces have been used to prescribe orientation, density and stretching of anisotropic meshes. But, such structures are only con...
Adrien Loseille, Frédéric Alauzet
ICDE
1995
IEEE
180views Database» more  ICDE 1995»
16 years 5 months ago
Building an Integrated Active OODBMS: Requirements, Architecture, and Design Decisions
Active OODBMSs must provide e cient support for event detection, composition, and rule execution. Previous experience, reported here, building active capabilities on top of existi...
Alejandro P. Buchmann, Jürgen Zimmermann, Jos...