Sciweavers

3238 search results - page 559 / 648
» Not Enough Points Is Enough
Sort
View
ASIACRYPT
2003
Springer
14 years 2 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
BTW
2003
Springer
118views Database» more  BTW 2003»
14 years 2 months ago
Information System Architectures: From Art to Science
: The presentation claims that architectural design plays a crucial role in system development as a first step in a process that turns a requirements specification into a working s...
Peter C. Lockemann
CP
2003
Springer
14 years 2 months ago
A SAT-Based Approach to Multiple Sequence Alignment
Multiple sequence alignment is a central problem in Bioinformatics. A known integer programming approach is to apply branch-and-cut to exponentially large graph-theoretic models. T...
Steven David Prestwich, Desmond G. Higgins, Orla O...
ESORICS
2003
Springer
14 years 2 months ago
Rapid Mixing and Security of Chaum's Visual Electronic Voting
Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standard...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
GECCO
2003
Springer
133views Optimization» more  GECCO 2003»
14 years 2 months ago
Dynamic Strategies in a Real-Time Strategy Game
Abstract. Most modern real-time strategy computer games have a sophisticated but fixed ‘AI’ component that controls the computer’s actions. Once the user has learned how suc...
William Joseph Falke II, Peter Ross