Sciweavers

1818 search results - page 335 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
APLAS
2004
ACM
14 years 2 months ago
A Functional Language for Logarithmic Space
Abstract. More than being just a tool for expressing algorithms, a welldesigned programming language allows the user to express her ideas efficiently. The design choices however eï...
Peter Møller Neergaard
SAC
2004
ACM
14 years 2 months ago
A Ubiquitous Computing environment for aircraft maintenance
Ubiquitous Computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for havi...
Matthias Lampe, Martin Strassner, Elgar Fleisch
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
EUROCRYPT
2004
Springer
14 years 2 months ago
Practical Large-Scale Distributed Key Generation
Generating a distributed key, where a constant fraction of the players can reconstruct the key, is an essential component of many largescale distributed computing tasks such as ful...
John F. Canny, Stephen Sorkin
FASE
2004
Springer
14 years 2 months ago
Automated Debugging Using Path-Based Weakest Preconditions
Abstract. Software debugging is the activity of locating and correcting erroneous statements in programs. Automated tools to locate and correct the erroneous statements in a progra...
Haifeng He, Neelam Gupta