Sciweavers

626 search results - page 96 / 126
» Abstract Modularity
Sort
View
ERLANG
2004
ACM
14 years 2 months ago
Structured programming using processes
Structured Programming techniques are applied to a personal accounting software application implemented in erlang as a demonstration of the utility of processes as design construc...
Jay Nelson
WIDM
2004
ACM
14 years 2 months ago
Next generation CiteSeer
Abstract. CiteSeer began as the first search engine for scientific literature to incorporate Autonomous Citation Indexing, and has since grown to be a well-used, open archive for...
C. Lee Giles
WOSP
2004
ACM
14 years 2 months ago
Performance modeling from software components
When software products are assembled from pre-defined components, performance prediction should be based on the components also. This supports rapid model-building, using previous...
Xiuping Wu, C. Murray Woodside
ASIACRYPT
2004
Springer
14 years 2 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 2 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...