Sciweavers

308 search results - page 44 / 62
» User's Functions in Standard Prolog
Sort
View
PCI
2001
Springer
14 years 3 months ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
ASIACRYPT
1999
Springer
14 years 3 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 3 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
MOBICOM
1997
ACM
14 years 3 months ago
Composable ad-hoc Mobile Services for Universal Interaction
This paperintroduces the notion of “universalinteraction,” allowing a device to adapt its functionality to exploit services it discovers as it moves into a new environment. Us...
Todd D. Hodes, Randy H. Katz, Edouard Servan-Schre...
ECAI
1992
Springer
14 years 2 months ago
A Strategy for the Computation of Conditional Answers
We consider non-Horn Deductive Data Bases (DDB) represented in a First Order language without function symbols. In this context the DDB is an incomplete description of the world. ...
Robert Demolombe