Sciweavers

178 search results - page 27 / 36
» Dependability Arguments with Trusted Bases
Sort
View
EUROCRYPT
2010
Springer
14 years 6 days ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
KBSE
2000
IEEE
13 years 11 months ago
A Comparison of Questionnaire-Based and GUI-Based Requirements Gathering
: Software development includes gathering information about tasks, work practices and design options from users. Traditionally requirements gathering takes two forms. Interviews an...
J. Michael Moore, Frank M. Shipman III
VL
1993
IEEE
159views Visual Languages» more  VL 1993»
13 years 11 months ago
A Visual Logic Programming Language Based on Sets and Partitioning Constraints
This paper presents a new programming language named SPARCL that has four major elements: it is a visual language, it is a logic programming language, it relies on sets to organiz...
Lindsey L. Spratt, Allen L. Ambler
ICTAC
2009
Springer
13 years 5 months ago
A First-Order Policy Language for History-Based Transaction Monitoring
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting,...
Andreas Bauer 0002, Rajeev Goré, Alwen Tiu
LREC
2010
152views Education» more  LREC 2010»
13 years 8 months ago
Grammar Extraction from Treebanks for Hindi and Telugu
Grammars play an important role in many Natural Language Processing (NLP) applications. The traditional approach to creating grammars manually, besides being labor-intensive, has ...
Prasanth Kolachina, Sudheer Kolachina, Anil Kumar ...