Sciweavers

1240 search results - page 240 / 248
» Composition with Target Constraints
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
DESRIST
2009
Springer
109views Education» more  DESRIST 2009»
14 years 1 months ago
The constitutive and the instrumental in social design
Simon’s The Sciences of the Artificial is rightly influential as a founding text in design research in the information systems field (IS). Simon’s contributions in the same vo...
Murali Venkatesh
GPCE
2009
Springer
14 years 1 months ago
Classifying Java class transformations for pervasive virtualized access
The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to ...
Phil McGachey, Antony L. Hosking, J. Eliot B. Moss
LCTRTS
2001
Springer
14 years 1 months ago
A Dynamic Programming Approach to Optimal Integrated Code Generation
Phase-decoupled methods for code generation are the state of the art in compilers for standard processors but generally produce code of poor quality for irregular target architect...
Christoph W. Keßler, Andrzej Bednarski
IPCCC
1999
IEEE
14 years 26 days ago
Accurately modeling speculative instruction fetching in trace-driven simulation
Performance evaluation of modern, highly speculative, out-of-order microprocessors and the corresponding production of detailed, valid, accurate results have become serious challe...
R. Bhargava, L. K. John, F. Matus