Sciweavers

953 search results - page 124 / 191
» A note on the paper
Sort
View
ASIACRYPT
2008
Springer
13 years 9 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
CONCUR
2008
Springer
13 years 9 months ago
Towards a Unified Approach to Encodability and Separation Results for Process Calculi
In this paper, we present a unified approach to evaluating the relative expressive power of process calculi. In particular, we identify a small set of criteria (that have already b...
Daniele Gorla
CSCW
2008
ACM
13 years 9 months ago
Evaluating the deployment of a mobile technology in a hospital ward
Since health care teams are often distributed across time and location, information sharing is crucial for effective patient care. Studying the use of a mobile information technol...
Charlotte Tang, M. Sheelagh T. Carpendale
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
13 years 9 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
LREC
2010
141views Education» more  LREC 2010»
13 years 9 months ago
Design and Application of a Gold Standard for Morphological Analysis: SMOR as an Example of Morphological Evaluation
This paper describes general requirements for evaluating and documenting NLP tools with a focus on morphological analysers and the design of a Gold Standard. It is argued that any...
Gertrud Faaß, Ulrich Heid, Helmut Schmid