Sciweavers

7112 search results - page 1332 / 1423
» Power in normative systems
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
DDEP
2000
Springer
14 years 1 months ago
Perceptually-Tuned Grayscale Characters Based on Parametrisable Component Fonts
Abstract. Our component-based parametrisable font system is a newly developed font description and reproduction technology. It incorporates for each basic character shape a softwar...
Changyuan Hu, Roger D. Hersch
ADC
1999
Springer
97views Database» more  ADC 1999»
14 years 1 months ago
Pseudo-Naive Evaluation
We introduce pseudo-naive evaluation, a method for execution of mixed top-down/bottom-up logic programs and deductive databases. The method is intermediate in power between naive ...
Donald A. Smith, Mark Utting
SIGDOC
1998
ACM
14 years 1 months ago
Managing the Software Design Documents with XML
It is hard to manage the software design documents within a distributed development team. The issues include the format, distribution and evolution of data. This paper mainly focu...
Junichi Suzuki, Yoshikazu Yamamoto
WAN
1998
Springer
14 years 1 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
« Prev « First page 1332 / 1423 Last » Next »