Sciweavers

1129 search results - page 159 / 226
» Modular Ranking Abstraction
Sort
View
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 1 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
AIIA
2005
Springer
14 years 1 months ago
Automata Slicing for Diagnosing Discrete-Event Systems with Partially Ordered Observations
Abstract. When dealing with real systems, it is unrealistic to suppose that observations can be totally ordered according to their emission dates. The partially ordered observation...
Alban Grastien, Marie-Odile Cordier, Christine Lar...
AOSE
2005
Springer
14 years 1 months ago
Automating Model Transformations in Agent-Oriented Modelling
Abstract. Current Agent-Oriented Software Engineering (AOSE) methodologies adopt a model-based approach for analysis and design, but, in order to become of practical use, they shou...
Anna Perini, Angelo Susi
CAISE
2005
Springer
14 years 1 months ago
Building Self-Managing Web Information Systems from Generic Components
Abstract. The increasing need for device independence and personalization forces organizations to automatically adapt their Web Information Systems (WISs) to individual users and t...
Geert-Jan Houben, Zoltán Fiala, Kees van de...
GPCE
2005
Springer
14 years 1 months ago
Language Requirements for Large-Scale Generic Libraries
Abstract. The past decade of experience has demonstrated that the generic programming methodology is highly effective for the design, implementation, and use of large-scale softwar...
Jeremy G. Siek, Andrew Lumsdaine