Sciweavers

1573 search results - page 87 / 315
» Signs and Formal Concepts
Sort
View
IACR
2011
149views more  IACR 2011»
12 years 9 months ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
IFL
2005
Springer
116views Formal Methods» more  IFL 2005»
14 years 3 months ago
Proof Tool Support for Explicit Strictness
In programs written in lazy functional languages such as for example Clean and Haskell, the programmer can choose freely whether particular subexpressions will be evaluated lazily ...
Marko C. J. D. van Eekelen, Maarten de Mol
ISSS
1998
IEEE
117views Hardware» more  ISSS 1998»
14 years 2 months ago
HDL-Based Modeling of Embedded Processor Behavior for Retargetable Compilation
The concept of retargetability enables compiler technology to keep pace with the increasing variety of domain-speci c embedded processors. In order to achieve user retargetability,...
Rainer Leupers
ECOOP
1998
Springer
14 years 2 months ago
Classifying Inheritance Mechanisms in Concurrent Object Oriented Programming
Abstract. Inheritance is one of the key concepts in object-oriented programming. However, the usefulness of inheritance in concurrent objectoriented programming is greatly reduced ...
Lobel Crnogorac, Anand S. Rao, Kotagiri Ramamohana...
EUC
2007
Springer
14 years 4 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...