Sciweavers

1516 search results - page 282 / 304
» How Open is e-Science
Sort
View
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
13 years 10 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
HRI
2007
ACM
13 years 10 months ago
Robotic etiquette: results from user studies involving a fetch and carry task
This paper presents results, outcomes and conclusions from a series of Human Robot Interaction (HRI) trials which investigated how a robot should approach a human in a fetch and c...
Michael L. Walters, Kerstin Dautenhahn, Sarah N. W...
CAV
2010
Springer
225views Hardware» more  CAV 2010»
13 years 10 months ago
Merit: An Interpolating Model-Checker
Abstract. We present the tool MERIT, a CEGAR model-checker for safety propf counter-systems, which sits in the Lazy Abstraction with Interpolants (LAWI) framework. LAWI is parametr...
Nicolas Caniart
EDO
2006
Springer
13 years 10 months ago
Improving modularity of reflective middleware with aspect-oriented programming
Reflective middleware has been proposed as an effective way to enhance adaptability of component-oriented middleware architectures. To be effectively adaptable, the implementation...
Nélio Cacho, Thaís Vasconcelos Batis...
SAIG
2000
Springer
13 years 10 months ago
On Jones-Optimal Specialization for Strongly Typed Languages
The phrase optimal program specialization" was de ned by Jones et al. in 1993 to capture the idea of a specializer being strong enough to remove entire layers of interpretatio...
Henning Makholm