Sciweavers

1412 search results - page 35 / 283
» types 2004
Sort
View
IWEC
2004
13 years 10 months ago
Probabilistic Opponent-Model Search in Bao
In Probabilistic Opponent-Model search(PrOM search) the opponent is modelled by a mixed strategy of N opponent types 0 . . .
Jeroen Donkers, H. Jaap van den Herik, Jos W. H. M...
ECIS
2000
13 years 10 months ago
What's in a Name? Conceptual Issues in Defining Electronic Commerce
Definitions of electronic commerce are many and varied. They indicate a lack of consensus about what electronic commerce is. `A `definition' implies a direct and unproblematic...
Linda Wilkins, Paula M. C. Swatman, Tanya Castlema...
IFIP
2004
Springer
14 years 2 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
PPPJ
2004
ACM
14 years 2 months ago
Safe instantiation in generic Java
This paper presents the “Safe-Instantiation Principle,” a new design principle for evaluating extensions of Java with support for generic types. We discuss the GJ and NextGen ...
Eric E. Allen, Robert Cartwright
CSL
2004
Springer
14 years 2 months ago
Complete Lax Logical Relations for Cryptographic Lambda-Calculi
Abstract. Security properties are profitably expressed using notions of contextual equivalence, and logical relations are a powerful proof technique to establish contextual equiva...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...