Sciweavers

1418 search results - page 240 / 284
» How to Explain Mistakes
Sort
View
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
LICS
2012
IEEE
11 years 11 months ago
Logics of Dynamical Systems
—We study the logic of dynamical systems, that is, logics and proof principles for properties of dynamical systems. Dynamical systems are mathematical models describing how the s...
André Platzer
ICFP
2005
ACM
14 years 8 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
CODES
2006
IEEE
14 years 2 months ago
Multi-processor system design with ESPAM
For modern embedded systems, the complexity of embedded applications has reached a point where the performance requirements of these applications can no longer be supported by emb...
Hristo Nikolov, Todor Stefanov, Ed F. Deprettere
ELPUB
2006
ACM
14 years 2 months ago
Using a Walk Ontology for Capturing Language Independent Navigation Instructions
Walking is becoming increasingly popular as a leisure activity across Europe. Outdoor equipment has modernized, gained flexibility and lost weight. GPS devices are gaining popular...
Bert Paepen, Jan Engelen