Sciweavers

680 search results - page 64 / 136
» Complexity of Strict Implication
Sort
View
138
Voted
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 2 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu
197
Voted
LATINCRYPT
2010
15 years 1 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
129
Voted
ICSEA
2009
IEEE
15 years 13 days ago
Software Process Improvement in Multimodel Environments
-- Software is increasing in size and complexity. As a direct implication, organizations nd it more difficult to achieve the desired product quality. Process improvement models are...
André Ferreira, Ricardo Jorge Machado
122
Voted
PODS
2008
ACM
155views Database» more  PODS 2008»
16 years 2 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
130
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Revel8or: Model Driven Capacity Planning Tool Suite
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Liming Zhu, Yan Liu, Ngoc Bao Bui, Ian Gorton