Sciweavers

1487 search results - page 192 / 298
» Two Kinds of Metonymy
Sort
View
WER
1999
Springer
14 years 1 months ago
A Requirements Elicitation Approach Based in Templates and Patterns
One of the main problems of requirements elicitation is expressing customer requirements in a form that can be understood not only by requirements engineers but also by noncomputer...
Amador Durán Toro, B. Bernárdez Jim&...
NDSS
1998
IEEE
14 years 1 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
HT
1998
ACM
14 years 1 months ago
Linking by Inking: Trailblazing in a Paper-Like Hypertext
“Linking by inking” is a new interface for reader-directed link construction that bridges reading and browsing activities. We are developing linking by inking in XLibris, a hy...
Morgan N. Price, Gene Golovchinsky, Bill N. Schili...
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
14 years 1 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
APSEC
1997
IEEE
14 years 1 months ago
A Test-case Generation Method for Concurrent Programs Including Task-types
A task-type in concurrent programs is a template of task-instances which are dynamically generated in execution of the programs. The number of the generated taskinstances may not ...
Tetsuro Katayama, Zengo Furukawa, Kazuo Ushijima