Sciweavers

2102 search results - page 284 / 421
» A Relational Model for Object-Oriented Designs
Sort
View
APLAS
2004
ACM
15 years 10 months ago
An Algebraic Approach to Bi-directional Updating
In many occasions would one encounter the task of maintaining the consistency of two pieces of structured data that are related by some transform — synchronising bookmarks in di...
Shin-Cheng Mu, Zhenjiang Hu, Masato Takeichi
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 10 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 10 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
SWAT
2004
Springer
129views Algorithms» more  SWAT 2004»
15 years 10 months ago
Online Scheduling of Splittable Tasks in Peer-to-Peer Networks
We consider online scheduling of splittable tasks on parallel machines. In our model, each task can be split into a limited number of parts, that can then be scheduled independentl...
Leah Epstein, Rob van Stee
IAT
2003
IEEE
15 years 10 months ago
Web Course Self-Adaptation
This paper describes the methodology of an intelligent agent for building a self-adaptive course on the Web. An important task, therefore, is to combine adaptability with the lear...
Mohammed Abdel Razek, Claude Frasson, Marc Kaltenb...