Sciweavers

17018 search results - page 40 / 3404
» From the How to the What
Sort
View
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
ETS
2006
IEEE
118views Hardware» more  ETS 2006»
14 years 1 months ago
Living with Failure: Lessons from Nature?
- The resources available on a chip continue to grow, following Moore's Law. However, the major process by which the benefits of Moore's Law accrue, which is the continui...
Steve Furber
ECAL
2003
Springer
14 years 1 months ago
Building a Hybrid Society of Mind Using Components from Ten Different Authors
Building large complex minds is difficult because we do not understand what the necessary components are or how they should interact. Even if the components were known it is diffic...
Ciarán O'Leary, Mark Humphrys
COLING
2000
13 years 9 months ago
Word Order Acquisition from Corpora
In this paper we describe a method of acquiring word order fl'om corpora. Word order is defined as the order of modifiers, or the order of phrasal milts called 'bunsetsu...
Kiyotaka Uchimoto, Masaki Murata, Qing Ma, Satoshi...
SAC
2008
ACM
13 years 7 months ago
Workflow management versus case handling: results from a controlled software experiment
Business Process Management (BPM) technology has become an important instrument for improving process performance. When considering its use, however, enterprises typically have to...
Bela Mutschler, Barbara Weber, Manfred Reichert