Sciweavers

576 search results - page 18 / 116
» What's in a Domain
Sort
View
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
AGILEDC
2003
IEEE
14 years 3 months ago
YP and Urban Simulation: Applying an Agile Programming Methodology in a Politically Tempestuous Domain
YP is an agile programming methodology that has evolved over the past 15 years. Many of its features are common to other agile methodologies; its novel features include using a hi...
Bjørn N. Freeman-Benson, Alan Borning
CN
2006
64views more  CN 2006»
13 years 10 months ago
Piggybacking related domain names to improve DNS performance
In this paper, we present a novel approach to exploit the relationships among domain names to improve the cache hit rate for a local DNS server. Using these relationships, an auth...
Hao Shang, Craig E. Wills
JCAL
2002
65views more  JCAL 2002»
13 years 9 months ago
Models of pedagogical implementation of ICT in Israeli schools
The paper analyses the data collected in 10 schools in Israel which have incorporated ICT in unique ways and have succeeded in devising innovative classroom pedagogies and changes ...
David Mioduser, Rafi Nachmias, D. Tubin, A. Forkos...
CORR
1998
Springer
82views Education» more  CORR 1998»
13 years 9 months ago
Tractability of Theory Patching
In this paper we consider the problem of theory patching, in which we are given a domain theory, some of whose components are indicated to be possibly awed, and a set of labeled t...
Shlomo Argamon-Engelson, Moshe Koppel