Sciweavers

1150 search results - page 104 / 230
» Note from the Editor
Sort
View
CLEF
2001
Springer
14 years 1 months ago
iCLEF 2001 at Maryland: Comparing Term-for-Term Gloss and MT
For the first interactive Cross-Language Evaluation Forum, the Maryland team focused on comparison of term-for-term gloss translation with full machine translation for the documen...
Jianqiang Wang, Douglas W. Oard
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
JSSPP
2001
Springer
14 years 1 months ago
Characteristics of a Large Shared Memory Production Workload
This paper characterizes the production workload that highly utilizes the NCSA Origin 2000. The characterization includes the distributions of job interarrival time, requested num...
Su-Hui Chiang, Mary K. Vernon
BIRTHDAY
2000
Springer
14 years 1 months ago
Discrete time process algebra with silent step
The axiom system ACP of [10] was extended to discrete time in [6]. Here, we proceed to define the silent step in this theory in branching bisimulation semantics [7, 15] rather th...
Jos C. M. Baeten, Jan A. Bergstra, Michel A. Renie...