Sciweavers

220 search results - page 31 / 44
» ideal 2005
Sort
View
SIGADA
2005
Springer
14 years 4 months ago
AspectAda: aspect oriented programming for ada95
Concerns for concurrent systems are not always easy to modularize within single units using traditional programming languages. The concept of aspect orientation can be applied to ...
Knut H. Pedersen, Constantinos Constantinides
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 4 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
TCC
2005
Springer
108views Cryptology» more  TCC 2005»
14 years 4 months ago
Comparing Two Notions of Simulatability
In this work, relations between the security notions standard simulatability and universal simulatability for cryptographic protocols are investigated. A simulatability-based notio...
Dennis Hofheinz, Dominique Unruh
WEBDB
2005
Springer
132views Database» more  WEBDB 2005»
14 years 4 months ago
XFrag: A Query Processing Framework for Fragmented XML Data
Data fragmentation offers various attractive alternatives to organizing and managing data, and presents interesting characteristics that may be exploited for efficient processing...
Sujoe Bose, Leonidas Fegaras
AAAI
2008
14 years 1 months ago
Lifted First-Order Belief Propagation
Unifying first-order logic and probability is a long-standing goal of AI, and in recent years many representations combining aspects of the two have been proposed. However, infere...
Parag Singla, Pedro Domingos