Sciweavers

759 search results - page 69 / 152
» What Can Be Implemented Anonymously
Sort
View
TOOLS
2008
IEEE
14 years 4 months ago
Controlling Accessibility in Agile Projects with the Access Modifier Modifier
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...
Philipp Bouillon, Eric Großkinsky, Friedrich...
ASIACRYPT
2000
Springer
14 years 2 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
ACMACE
2005
ACM
14 years 3 months ago
Possession techniques for interaction in real-time strategy augmented reality games
There have been a number of interactive games created for Augmented Reality (AR) environments. In this paper, interaction techniques to support Real-Time Strategy (RTS) games in A...
Keith Phillips, Wayne Piekarski
ENTCS
2008
64views more  ENTCS 2008»
13 years 10 months ago
General Refinement, Part Two: Flexible Refinement
In the previous, companion, paper [13] to this paper we introduced our general model of refinement, discussed ideas around determinism and interfaces that the general definition r...
Steve Reeves, David Streader
DAGSTUHL
2006
13 years 11 months ago
Choreography Conformance Checking: An Approach based on BPEL and Petri Nets
Abstract Recently, languages such as BPEL and CDL have been proposed to describe the way services can interact from a behavioral perspective. The emergence of these languages heral...
Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang...