Sciweavers

691 search results - page 69 / 139
» Axiomatizing geometric constructions
Sort
View
EUROCRYPT
2010
Springer
14 years 15 days ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
CONTEXT
1999
Springer
13 years 12 months ago
Contexts, Domains, and Software
We survey some issues that relate to context dependence and context sensitivity in the development of software, particularly in relation to information systems by defining a range...
Alfs T. Berztiss
LPNMR
1990
Springer
13 years 11 months ago
The meaning of Negative Premises in Transition System Specifications
We present a general theory for the use of negative premises in the rules of Transition System Specifications (TSSs). We formulate a criterion that should be satisfied by a TSS in ...
Roland N. Bol, Jan Friso Groote
CCA
2009
Springer
13 years 11 months ago
Effective Choice and Boundedness Principles in Computable Analysis
Abstract. In this paper we study a new approach to classify mathematical theorems according to their computational content. Basically, we are asking the question which theorems can...
Vasco Brattka, Guido Gherardi
ACTA
2000
82views more  ACTA 2000»
13 years 7 months ago
Semantics analysis through elementary meanings
Thesaurus is a collection of words classified according to some relatedness measures among them. In this paper, we lay the theoretical foundations of thesaurus construction through...
Youichi Kobuchi, Takashi Saito, Hidenobu Nunome