Sciweavers

1193 search results - page 235 / 239
» A primer of simple theories
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 10 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
NDJFL
1998
100views more  NDJFL 1998»
13 years 10 months ago
Failure of Interpolation in Combined Modal Logics
We investigate transfer of interpolation in such combinations of modal logic which lead to interaction of the modalities. Combining logics by taking products often blocks transfer...
Maarten Marx, Carlos Areces
UMUAI
1998
119views more  UMUAI 1998»
13 years 10 months ago
COLLAGEN: A Collaboration Manager for Software Interface Agents
We have implemented an application-independent collaboration manager, called Collagen, based on the SharedPlan theory of discourse, and used it to build a software interface agent...
Charles Rich, Candace L. Sidner
ECCC
2010
98views more  ECCC 2010»
13 years 9 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
ISR
2010
13 years 9 months ago
Electronic Markets, Search Costs, and Firm Boundaries
We study how electronic markets that facilitate broader inter-firm transactions affect the vertical scope of emerging IT-enabled extended enterprises. We do so by modeling firms...
Ramesh Sankaranarayanan, Arun Sundararajan