Sciweavers

423 search results - page 33 / 85
» ideal 2007
Sort
View
TCC
2007
Springer
145views Cryptology» more  TCC 2007»
14 years 2 months ago
(Password) Authenticated Key Establishment: From 2-Party to Group
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
VLDB
2007
ACM
144views Database» more  VLDB 2007»
14 years 2 months ago
A Relational Approach to Incrementally Extracting and Querying Structure in Unstructured Data
There is a growing consensus that it is desirable to query over the structure implicit in unstructured documents, and that ideally this capability should be provided incrementally...
Eric Chu, Akanksha Baid, Ting Chen, AnHai Doan, Je...
DEBS
2007
ACM
14 years 18 days ago
Architect's dream or developer's nightmare?
Architectural principles such as loose coupling are the key drivers behind the adoption of service-oriented architectures. Service-oriented architectures promote concepts such as c...
Gregor Hohpe
AAAI
2007
13 years 11 months ago
Generating and Solving Logic Puzzles through Constraint Satisfaction
Solving logic puzzles has become a very popular past-time, particularly since the Sudoku puzzle started appearing in newspapers all over the world. We have developed a puzzle gene...
Barry O'Sullivan, John Horan
WSC
2007
13 years 11 months ago
Monte Carlo methods in the physical sciences
I will review the role that Monte Carlo methods play in the physical sciences. They are very widely used for a number of reasons: they permit the rapid and faithful transformation...
Malvin H. Kalos