Sciweavers

65 search results - page 4 / 13
» Inherited Limits
Sort
View
SECPERU
2006
IEEE
14 years 3 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
DATE
2002
IEEE
113views Hardware» more  DATE 2002»
14 years 2 months ago
BerkMin: A Fast and Robust Sat-Solver
We describe a SAT-solver, BerkMin, that inherits such features of GRASP, SATO, and Chaff as clause recording, fast BCP, restarts, and conflict clause “aging”. At the same time...
Evguenii I. Goldberg, Yakov Novikov
VR
2000
IEEE
138views Virtual Reality» more  VR 2000»
14 years 2 months ago
Development of Ground Surface Simulator for Tel-E-Merge System
In the paper, we describe a series of stages in the development of a new virtual locomotion device designed to enhance remote, interpersonal communications. The latest system, cal...
Haruo Noma, Toshiaki Sugihara, Tsutomu Miyasato
ECOOP
1999
Springer
14 years 2 months ago
Type-Safe Delegation for Run-Time Component Adaptation
Abstract. The aim of component technology is the replacement of large monolithic applications with sets of smaller software components, whose particular functionality and interoper...
Günter Kniesel
ESOP
2006
Springer
14 years 1 months ago
Type-Based Amortised Heap-Space Analysis
Abstract. We present a type system for a compile-time analysis of heapspace requirements of Java style object-oriented programs with explicit deallocation. Our system is based on a...
Martin Hofmann, Steffen Jost