Sciweavers

680 search results - page 64 / 136
» Complexity of Strict Implication
Sort
View
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 11 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu
LATINCRYPT
2010
13 years 9 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
ICSEA
2009
IEEE
13 years 9 months ago
Software Process Improvement in Multimodel Environments
-- Software is increasing in size and complexity. As a direct implication, organizations nd it more difficult to achieve the desired product quality. Process improvement models are...
André Ferreira, Ricardo Jorge Machado
PODS
2008
ACM
155views Database» more  PODS 2008»
14 years 11 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Revel8or: Model Driven Capacity Planning Tool Suite
Designing complex multi-tier applications that must meet strict performance requirements is a challenging software engineering problem. Ideally, the application architect could de...
Liming Zhu, Yan Liu, Ngoc Bao Bui, Ian Gorton