Sciweavers

69 search results - page 12 / 14
» Constructing the Group Preserving a System of Forms
Sort
View
EUROCRYPT
2010
Springer
14 years 8 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 7 months ago
Polyominoes Simulating Arbitrary-Neighborhood Zippers and Tilings
This paper provides a bridge between the classical tiling theory and cellular automata on one side, and the complex neighborhood self-assembling situations that exist in practice,...
Lila Kari, Benoît Masson
AOSD
2008
ACM
13 years 9 months ago
AspectT: aspect-oriented test case instantiation
e instantiation is the transformation of abstract test cases cutable test scripts. Abstract test cases are either created during model based test case generation or are manually d...
Sebastian Benz
IJET
2007
121views more  IJET 2007»
13 years 7 months ago
A Technology Based Program That Matches Enrichment Resources With Student Strengths
Remarkable advances in instructional communication technology (ICT) have now made is possible to provide high levels of enrichment and the kinds of curricular differentiation that...
Joseph S. Renzulli, Sally M. Reis
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 23 days ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier