Sciweavers

1615 search results - page 78 / 323
» What's new
Sort
View
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ECSA
2010
Springer
13 years 10 months ago
Software Architecture Constraints as Customizable, Reusable and Composable Entities
One of the major advantages of component-based software engineering is the ability for developers to reuse and assemble software entities to build complex software. Whereas decompo...
Chouki Tibermacine, Christophe Dony, Salah Sadou, ...
DIGRA
2005
Springer
14 years 2 months ago
Extending Soft Models to Game Design: Flow, Challenges and Conflicts
Challenge and conflict are elements that all game designers strive to engineer into their games. Research shows that challenge is what drives a high proportion of games players ye...
Abdennour El Rhalibi, Martin Hanneghan, Stephen Ta...
ERCIMDL
2005
Springer
133views Education» more  ERCIMDL 2005»
14 years 2 months ago
XMLibrary Search: An XML Search Engine Oriented to Digital Libraries
Abstract. The increase in the amount of data available in digital libraries calls for the development of search engines that allow the users to find quickly and effectively what ...
Enrique Sánchez Villamil, Carlos Gonz&aacut...
AIMSA
2004
Springer
14 years 2 months ago
Coordinating Semantic Peers
Abstract. The problem of finding an agreement on the meaning of heterogeneous schemas is one of the key issues in the development of the Semantic Web. In this paper, we propose a ...
Paolo Bouquet, Luciano Serafini, Stefano Zanobini