Sciweavers

933 search results - page 172 / 187
» Extending Forward Checking
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
ISORC
2000
IEEE
14 years 25 days ago
A Vision of the Future for the Air Force (and Perhaps the Whole DoD)
The Air Force has enthusiastically endorsed, at its most senior levels, advanced thinking with regard to the application of information technology. Recently, the notion of a Joint...
Thomas F. Saunders
SMA
1999
ACM
107views Solid Modeling» more  SMA 1999»
14 years 22 days ago
Generation of swept volumes of toroidal endmills in five-axis motion using space curves
Accurate prediction of the swept volume of a cutting tool is essential in NC verification algorithms for detecting deficiencies in a proposed tool path, such as gouging, undercutt...
David Roth, Sanjeev Bedi, Fathy Ismail
ISPAN
1997
IEEE
14 years 19 days ago
A New General Purpose Parallel Database System
This paper is concerned with the transparent parallelisation of declarative database queries, based on theoretical principles. We have designed an entire database architecture sui...
Mohamad Afshar, J. Bates, Gavin M. Bierman, K. Moo...
SIGCOMM
1996
ACM
14 years 17 days ago
Receiver-Driven Layered Multicast
State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-a...
Steven McCanne, Van Jacobson, Martin Vetterli