Sciweavers

2200 search results - page 109 / 440
» The Generalized Pignistic Transformation
Sort
View
ASIACRYPT
2007
Springer
14 years 3 months ago
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
In this paper we show a general transformation from any honest verifier statistical zero-knowledge argument to a concurrent statistical zero-knowledge argument. Our transformatio...
Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit...
ISW
2004
Springer
14 years 2 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
SIGGRAPH
2003
ACM
14 years 2 months ago
Mesh modelling with curve analogies
Modelling by analogy has become a powerful paradigm for editing images. Using a pair of before- and afterexample images of a transformation, a system that models by analogy produc...
Steve Zelinka, Michael Garland
ASP
2003
Springer
14 years 2 months ago
Using Nested Logic Programs for Answer Set Programming
We present a general method to improve computation of answer sets by analyzing structural properties of normal logic programs. Therefore we use labeled directed graphs associated t...
Thomas Linke
JIT
1999
Springer
123views Database» more  JIT 1999»
14 years 1 months ago
Byte Code Engineering
The term “Java” is used to denote two different concepts: the language itself and the related execution environment, the Java Virtual Machine (JVM), which executes byte code in...
Markus Dahm