Sciweavers

236 search results - page 12 / 48
» el 2007
Sort
View
IJCAI
1989
13 years 10 months ago
A Framework for Network Modeling in Prolog
A new formalism for building network models in Prolog is proposed. It is based on a new semantic interpretation of the Prolog variables and clauses, which are used to represent th...
Z. I. Markov
ACS
2006
13 years 8 months ago
Constructing Infinite Comatrix Corings from Colimits
We propose a class of in nite comatrix corings, and describe them as colimits of systems of usual comatrix corings. The in nite comatrix corings of El Kaoutit and Gomez Torrecillas...
Stefaan Caenepeel, E. De Groot, J. Vercruysse
ISW
2007
Springer
14 years 2 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
14 years 3 months ago
A QoS-based Service Composition for Content Adaptation
Today’s Internet suffers from the problem of heterogeneity in client devices, network connectivity, content format, and users’ preferences. The framework presented in this pap...
Khalil El-Khatib, Gregor von Bochmann, Abdulmotale...
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 2 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud