Sciweavers

762 search results - page 56 / 153
» How to realize
Sort
View
FOCS
1999
IEEE
15 years 8 months ago
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
We introduce the notion of non-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-m...
Amit Sahai
ARES
1998
Springer
15 years 8 months ago
Architecture-Centric Software Development Based on Extended Design Spaces
The realization of software projects can be significantly eased by extending the focus of reuse to architectural aspects instead of concentrating on separate software elements. Ye...
Lothar Baum, Lars Geyer, Georg Molter, Steffen Rot...
KBSE
1997
IEEE
15 years 8 months ago
Precise Specification and Automatic Application of Design Patterns
Despite vast interest in design patterns, the specification and application of patterns is generally assumed to rely on manual implementation. We describe a precise method of spec...
Amnon H. Eden, Amiram Yehudai, Joseph Gil
ICTAI
1994
IEEE
15 years 8 months ago
Tooling the Lexicon Acquisition Process for Large-Scale KBMT
Large-scale lexical knowledge acquisition is one of the most time critical steps in developing a knowledge-based machine translation system. In particular, developing the syntacti...
John R. R. Leavitt, Deryle W. Lonsdale, Kevin Keck...
169
Voted
3DPVT
2006
IEEE
216views Visualization» more  3DPVT 2006»
15 years 7 months ago
Object Modeling with Guaranteed Fulfillment of Geometric Constraints
Object modeling under consideration of geometric constraints is an important task. In this paper we describe a novel approach to achieving this goal. It has the nice property that...
Da-Chuan Cheng, Xiaoyi Jiang