Sciweavers

2056 search results - page 408 / 412
» time 2000
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 9 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
JSS
2000
123views more  JSS 2000»
13 years 9 months ago
Approaches for broadcasting temporal data in mobile computing systems
Rapid advances in mobile communication technology have spawned many new mobile applications. A key element in many of these systems is the need to distribute real-time information...
Kam-yiu Lam, Edward Chan, Joe Chun-Hung Yuen
JSS
2000
86views more  JSS 2000»
13 years 9 months ago
Quantitative analysis of static models of processes
The upstream activities of software development projects are often viewed as both the most important, the least understood, and hence the most problematic. This is particularly no...
Keith Phalp, Martin J. Shepperd
KBS
2000
122views more  KBS 2000»
13 years 9 months ago
Creating knowledge maps by exploiting dependent relationships
Knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. In more recent times, researchers have investigated knowledge in a mor...
John L. Gordon
MICRO
2000
IEEE
176views Hardware» more  MICRO 2000»
13 years 9 months ago
An Advanced Optimizer for the IA-64 Architecture
level of abstraction, compared with the program representation for scalar optimizations. For example, loop unrolling and loop unrolland-jam transformations exploit the large regist...
Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M....