Sciweavers

828 search results - page 97 / 166
» types 2000
Sort
View
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
14 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
SIGGRAPH
2000
ACM
14 years 1 months ago
Pose space deformation: a unified approach to shape interpolation and skeleton-driven deformation
Pose space deformation generalizes and improves upon both shape interpolation and common skeleton-driven deformation techniques. This deformation approach proceeds from the observ...
John P. Lewis, Matt Cordner, Nickson Fong
SIGUCCS
2000
ACM
14 years 1 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
TIC
2000
Springer
110views System Software» more  TIC 2000»
14 years 1 months ago
Safe and Flexible Dynamic Linking of Native Code
Abstract. We present the design and implementation of the first complete framework for flexible and safe dynamic linking of native code. Our approach extends Typed Assembly Languag...
Michael W. Hicks, Stephanie Weirich, Karl Crary
WFLP
2000
Springer
124views Algorithms» more  WFLP 2000»
14 years 1 months ago
A Formal Approach to Reasoning about the Effectiveness of Partial Evaluation
We introduce a framework for assessing the effectiveness of partial evaluators in functional logic languages. Our framework is based on properties of the rewrite system that models...
Elvira Albert, Sergio Antoy, Germán Vidal