Sciweavers

2702 search results - page 309 / 541
» Message from the Editor
Sort
View
CSFW
1998
IEEE
15 years 8 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
PVM
1999
Springer
15 years 8 months ago
JPT: A Java Parallelization Tool
Abstract. PVM is a succesfull programming environment for distributed computing in the languages C and Fortran. Recently several implementations of PVM for Java have been added, ma...
Kristof Beyls, Erik H. D'Hollander, Yijun Yu
SCCC
1998
IEEE
15 years 8 months ago
Resurrecting Ada's Rendez-Vous in Java
Java is a programming language designed with concurrency in mind from its inception. However, the synchronization mechanism provided is a restricted version of Hoare's Monito...
Luis Mateu, José M. Piquer, Juan Leó...
SACRYPT
1998
Springer
15 years 8 months ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
COMPGEOM
1997
ACM
15 years 8 months ago
Algorithmic Tolerances and Semantics in Data Exchange
Within industrial contexts, a common view of the level of confidence needed in CAD data transfer processes may be expressed as “1 don’t mind if the [CAD data- tmnsfer] algorit...
Thomas J. Peters, Neil F. Stewart, David R. Fergus...