Sciweavers

1249 search results - page 84 / 250
» Limitations of the Even-Mansour Construction
Sort
View
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
ESOP
2008
Springer
13 years 11 months ago
Regular Expression Subtyping for XML Query and Update Languages
Abstract. XML database query languages such as XQuery employ regular expression types with structural subtyping. Subtyping systems typically have two presentations, which should be...
James Cheney
DAGSTUHL
2004
13 years 11 months ago
Removing Cycles in Esterel Programs
Abstract. Synchronous programs may contain cyclic signal interdependencies. This prohibits a static scheduling, which limits the choice of available compilation techniques for such...
Jan Lukoschus, Reinhard von Hanxleden
WSCG
2004
152views more  WSCG 2004»
13 years 11 months ago
Interactive Solid Texturing using Point-based Multiresolution Representations
This paper presents an interactive environment for texturing surfaces of arbitrary 3D objects. By uniquely using solid textures and applying them to the surface, we do not require...
Patrick Reuter, Benjamin Schmitt, Christophe Schli...
INFSOF
2008
148views more  INFSOF 2008»
13 years 10 months ago
Translating unstructured workflow processes to readable BPEL: Theory and implementation
The Business Process Execution Language for Web Services (BPEL) has emerged as the de-facto standard for implementing processes. Although intended as a language for connecting web ...
Wil M. P. van der Aalst, Kristian Bisgaard Lassen