Sciweavers

1514 search results - page 266 / 303
» Cues to Common Knowledge
Sort
View
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 3 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
IMSCCS
2006
IEEE
14 years 3 months ago
Identification of New Members of Hydrophobin Family Using Primary Structure Analysis
Background: Hydrophobins are fungal proteins that can turn into amphipathic membranes at hydrophilic/hydrophobic interfaces by self-assembly. The assemblages by Class I hydrophobi...
Kuan Yang, Youping Deng, Chaoyang Zhang, Mohamed O...
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 3 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
PLDI
2006
ACM
14 years 3 months ago
Context-sensitive domain-independent algorithm composition and selection
Progressing beyond the productivity of present-day languages appears to require using domain-specific knowledge. Domain-specific languages and libraries (DSLs) proliferate, but ...
Troy A. Johnson, Rudolf Eigenmann
SIGSOFT
2006
ACM
14 years 3 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.