Sciweavers

2184 search results - page 299 / 437
» Modeling and Realizing Interoperability
Sort
View
IEAAIE
1998
Springer
14 years 5 days ago
Generating Heuristics to Control Configuration Processes
Abstract. Configuration is the process of composing a system from a set of components such that the system fulfills a set of desired demands. The configuration process relies on a ...
Benno Stein
ELPUB
2007
ACM
13 years 12 months ago
Expectation and Reality in Digital Publishing: Some Australian Perspectives
This paper presents a brief summary of the findings of a Web-based survey of the views of Australian publishers, on the potential impact of digital technologies, followed by three...
Bill Martin, Hepu Deng, Xuemei Tian
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
13 years 11 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
ASIACRYPT
2006
Springer
13 years 11 months ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
LEGE
2003
80views Education» more  LEGE 2003»
13 years 9 months ago
Theoretical Foundations for E-Learning Environments Direct to Virtual Scientific Experiments
In this work we want to put in evidence the necessity to integrate theoretical, methodological and didactical aspects with innovative e-learning systems, in order to hypothesize po...