Sciweavers

831 search results - page 126 / 167
» A Security Concept for OLAP
Sort
View
OOPSLA
2004
Springer
14 years 3 months ago
Mirrors: design principles for meta-level facilities of object-oriented programming languages
We identify three design principles for reflection and metaprogramming facilities in object oriented programming languages. Encapsulation: meta-level facilities must encapsulate t...
Gilad Bracha, David Ungar
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
14 years 3 months ago
Fairness in Wallets with Observer
We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, dou...
Heike Neumann, Thomas Schwarzpaul
DISCEX
2003
IEEE
14 years 3 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
14 years 3 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari
ICRA
2003
IEEE
116views Robotics» more  ICRA 2003»
14 years 3 months ago
On the force capability of underactuated fingers
This paper studies the force capability of a particular class of underactuated fingers. Force capability is defined as the ability to create an external wrench onto a fixed obj...
Lionel Birglen, Clément Gosselin