|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7236 occurrences of 3979 keywords
|
|
|
Results
Found 8337 publication records. Showing 8337 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
56 | Achour Mostéfaoui, Michel Raynal, Corentin Travers |
Time-Free and Timer-Based Assumptions Can Be Combined to Obtain Eventual Leadership. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
time-free assumption, timer-based assumption, fault tolerance, distributed algorithm, Asynchronous system, leader election, process crash, hybrid protocol |
51 | Nick Moffat, Michael Goldsmith |
Assumption-Commitment Support for CSP Model Checking. |
J. Autom. Reason. |
2008 |
DBLP DOI BibTeX RDF |
Assumption-commitment, Model checking, Refinement, CSP, Compositional reasoning, Assume-guarantee |
47 | Allison B. Lewko, Brent Waters |
Efficient pseudorandom functions from the decisional linear assumption and weaker variants. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
decisional linear assumption, pseudorandom functions |
47 | Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 |
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
Kerckhoffs' assumption, provable security, chosen-ciphertext security |
45 | Kaoru Kurosawa, Swee-Huay Heng |
Relations Among Security Notions for Undeniable Signature Schemes. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature |
43 | Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro |
On the pseudo-freeness and the CDH assumption. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
CDH assumption, Pseudo-free group, Pseudo-free group with generalized exponential expressions, Weak pseudo-free group |
43 | Christian Schridde, Bernd Freisleben |
On the Validity of the phi-Hiding Assumption in Cryptographic Protocols. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
?-Hiding assumption, Jacobi symbol, Euler’s totient function |
42 | Atilla Elçi, Behnam Rahnama, Saman Kamran |
Defining a Strategy to Select Either of Closed/Open World Assumptions on Semantic Robots. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Open World Assumption, Semantic Robotics, Labyrinth, Ontology, Close World Assumption |
38 | Roland Ducournau, Floréal Morandat, Jean Privat |
Empirical assessment of object-oriented implementations with multiple inheritance and static typing. |
OOPSLA |
2009 |
DBLP DOI BibTeX RDF |
binary tree dispatch, downcast, method tables, multiple subtyping, open-world assumption, single inheritance, subtype test, virtual function table, interfaces, coloring, multiple inheritance, perfect hashing, closed-world assumption, type analysis, late binding, dynamic loading |
38 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
38 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
38 | Maria Luisa Bonet, Toniann Pitassi, Ran Raz |
No Feasible Interpolation for TC0-Frege Proofs. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
TC/sup 0/-Frege proofs, feasible interpolation, complexity-theoretic assumption, hardness assumption, lower bounds, theorem proving, Chinese Remainder Theorem, proof systems |
36 | Luigi Beghi, Elisabetta Xausa, Mario Zanforlin |
Modelling stereokinetic phenomena by a minimum relative motion assumption: the tilted disk, the ellipsoid and the tilted bar. |
Biol. Cybern. |
2008 |
DBLP DOI BibTeX RDF |
Stereokinetic phenomena, Minimum relative motion assumption, Tilted disk, Tilted ellipsoid, Tilted bar |
36 | Huafei Zhu |
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
Committed signatures, strong RSA assumption, fair exchange protocols |
35 | Xin He, Eric C. Frey |
Three-Class ROC Analysis - The Equal Error Utility Assumption and the Optimality of Three-Class ROC Surface Using the Ideal Observer. |
IEEE Trans. Medical Imaging |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Antonio Fernández Anta, Michel Raynal |
From an Intermittent Rotating Star to a Leader. |
OPODIS |
2007 |
DBLP DOI BibTeX RDF |
Assumption coverage, Eventual t-source, Moving source, Timely link, Fault-tolerance, Distributed algorithm, System model, Asynchronous system, Failure detector, Process crash, Partial synchrony, Omega, Message pattern, Eventual leader |
34 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
33 | Ping Yu 0006, Stephen R. Tate |
An Online/Offline Signature Scheme Based on the Strong RSA Assumption. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption |
33 | Swarup Mohalik, Ramaswamy Ramanujam |
A Presentation of Regular Languages in the Assumption - Commitment Framework. |
ACSD |
1998 |
DBLP DOI BibTeX RDF |
assumption-commitment, distributed systems, Regular languages |
33 | Y. J. Jiang, Yongyuth Aramkulchai |
On the Relationship between Assumption-based Framework and Autoepistemic Logic. |
ISMIS |
1994 |
DBLP DOI BibTeX RDF |
Assumption-based framework, Argumentation system, Reflexive Autoepistemic Logic, 3-valued AE logic, Abduction, Autoepistemic Logic |
33 | Paritosh K. Pandya |
Some Comments on the Assumption-Commitment Framework for Compositional Verification of Distributed Programs. |
REX Workshop |
1989 |
DBLP DOI BibTeX RDF |
Assumption Commitment Framework, Compositional Verification, Inductive Inference, Liveness properties |
32 | Isamu Teranishi, Wakaha Ogata |
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model |
31 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong |
Generic Security-Amplifying Methods of Ordinary Digital Signatures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability |
31 | Leonid Libkin, Cristina Sirangelo |
Data exchange and schema mappings in open and closed worlds. |
PODS |
2008 |
DBLP DOI BibTeX RDF |
open world assumption, data exchange, incomplete information, schema mappings, closed world assumption |
31 | Michel Raynal |
Eventual Leader Service in Unreliable Asynchronous Systems: Why? How? |
NCA |
2007 |
DBLP DOI BibTeX RDF |
Assumption coverage, Behavioral assumption, Eventual tsource, Eventual timely link, Fault-tolerance, Distributed algorithm, System model, Asynchronous system, Oracle, Failure detector, Process crash, Partial synchrony, Omega, Message pattern, Eventual leader |
31 | Joachim Biskup |
A Foundation of Codd's Relational Maybe-Operations. |
ACM Trans. Database Syst. |
1983 |
DBLP DOI BibTeX RDF |
maybe-tuple, open word assumption, relational database, redundancy, representation, relational algebra, information content, null value, closed world assumption, negative information |
31 | Jean-Sébastien Coron, David Naccache |
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Pham Ngoc Hung, Toshiaki Aoki, Takuya Katayama |
A Minimized Assumption Generation Method for Component-Based Software Verification. |
ICTAC |
2009 |
DBLP DOI BibTeX RDF |
minimal assumption, model checking, learning algorithm, modular verification, assume-guarantee reasoning |
28 | Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki |
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
concurrent proofs of knowledge, equiocable homomorphic commitment, forking lemma, multisignatures |
28 | Wei Gao 0007, Guilin Wang, Xueli Wang, Fei Li 0006 |
One-Round ID-Based Blind Signature Scheme without ROS Assumption. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Francesca Toni |
Assumption-Based Argumentation for Closed and Consistent Defeasible Reasoning. |
JSAI |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Umberto Straccia |
A Top-Down Query Answering Procedure for Normal Logic Programs Under the Any-World Assumption. |
ECSQARU |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Manfred Jaeger |
On Testing the Missing at Random Assumption. |
ECML |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Robert A. Lackman, David Tipper, John D. Spragins |
Sensitivity Analysis on the Assumption of Geometric Batch Arrivals for Real-Time Versus Non-Real-Time Scheduling in a Statistical Multiplexer. |
RTCSA |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Zhongqiang Wang, Li Zhu |
Intrinsic Image Decomposition with Local Smooth Assumption and Global Color Assumption. |
CVM |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura |
Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption. |
ProvSec |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Tzu-Tsung Wong |
Alternative prior assumptions for improving the performance of naïve Bayesian classifiers. |
Data Min. Knowl. Discov. |
2009 |
DBLP DOI BibTeX RDF |
Conjugate, Dirichlet assumption, Generalized Dirichlet distribution, Liouville distribution, Naïve Bayesian classifier |
26 | Feng-Jen Yang |
Eliciting an overlooked aspect of Bayesian reasoning. |
ACM SIGCSE Bull. |
2007 |
DBLP DOI BibTeX RDF |
Bayesian assumption, uncertainty management, Bayesian reasoning |
26 | Toru Nakanishi 0001, Nobuo Funabiki |
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps |
26 | Gerth Stølting Brodal, Rolf Fagerberg |
On the limits of cache-obliviousness. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
Cache-oblivious model, tall cache assumption, lower bound, sorting, permuting |
26 | Christian Cachin, Silvio Micali, Markus Stadler |
Computationally Private Information Retrieval with Polylogarithmic Communication. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Euler's function, hiding assumption, Private information retrieval, Integer factorization |
25 | Fei Pu, Yan Zhang |
Localizing Program Errors via Slicing and Reasoning. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Victor Shoup |
Using Hash Functions as a Hedge against Chosen Ciphertext Attack. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Dan Boneh, Xavier Boyen |
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Digital signatures, Bilinear pairings, Standard model, Strong unforgeability |
24 | Chia-Cheng Hsu, Guu-chang Yang, Wing C. Kwong |
Hard-Limiting Performance Analysis of 2-D Optical Codes Under the Chip-Asynchronous Assumption. |
IEEE Trans. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
24 | Javier Villares, Gregori Vázquez |
The Gaussian Assumption in Second-Order Estimation Problems in Digital Communications. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Søren E. Jespersen, Torben Bach Pedersen, Jesper Thorhauge |
Evaluating the markov assumption for web usage mining. |
WIDM |
2003 |
DBLP DOI BibTeX RDF |
markov models, web usage mining, information quality |
24 | Soyoung Kim, Yehia Massoud, S. Simon Wong |
On the Accuracy of Return Path Assumption for Loop Inductance Extraction for 0.1?m Technology and Beyond. |
ISQED |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Yun He, Hamid Krim |
Multiscale signal enhancement: beyond the normality and independence assumption. |
IEEE Trans. Image Process. |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Ronald Cramer, Victor Shoup |
Signature schemes based on the strong RSA assumption. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
digital signatures, RSA, provable security |
24 | MaoLin Qiu |
Computing Optical Flow Based on the Mass-Conserving Assumption. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Ronald Cramer, Victor Shoup |
Signature Schemes Based on the Strong RSA Assumption. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Alvin C. M. Kwan |
Validity of Normality Assumption in CSP Research. |
PRICAI |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Tomasz Imielinski, Nicolas Spyratos |
On Lossless Transformation of Database Schemes not Necessarily Satisfying Universal Instance Assumption. |
PODS |
1984 |
DBLP DOI BibTeX RDF |
|
23 | Qingfeng Cheng, Chuangui Ma, Xuexian Hu |
A New Strongly Secure Authenticated Key Exchange Protocol. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange |
23 | Takato Hirano, Koichiro Wada, Keisuke Tanaka |
Public-Key Cryptosystems with Primitive Power Roots of Unity. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism |
23 | He Ge, Stephen R. Tate |
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption |
23 | Sujing Zhou, Dongdai Lin |
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
LRSW Assumption, Verifier-Local Revocation, Group Signature, Bilinear Map |
23 | Geoffrey I. Webb, Janice R. Boughton, Zhihai Wang |
Not So Naive Bayes: Aggregating One-Dependence Estimators. |
Mach. Learn. |
2005 |
DBLP DOI BibTeX RDF |
semi-naive Bayes, attribute independence assumption, naive Bayes, probabilistic prediction |
23 | Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption |
23 | Sanjeev Kumar Mishra, Palash Sarkar 0001 |
Symmetrically Private Information Retrieval. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Private Information retrieval (PIR), Symmetrically Private Information Retrieval (SPIR), Quadratic Residuacity Assumption (QRA), Cryptographic Protocols, Probabilistic Encryption |
23 | Shaz Qadeer, Robert K. Brayton, Vigyan Singhal |
Latch Redundancy Removal Without Global Reset. |
ICCD |
1996 |
DBLP DOI BibTeX RDF |
global reset assumption, latch redundancy, safe replacement, delayed replacement, Finite state machine, core, strongly connected components |
22 | Peng Zhang 0001, Xingquan Zhu 0001, Yong Shi 0001, Xindong Wu 0001 |
An Aggregate Ensemble for Mining Concept Drifting Data Streams with Noise. |
PAKDD |
2009 |
DBLP DOI BibTeX RDF |
Noisy Data Streams, Ensemble Learning, Concept Drifting |
22 | Ronen Shaltiel, Christopher Umans |
Pseudorandomness for Approximate Counting and Sampling. |
CCC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Breaking the memory secrecy assumption. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass |
21 | Muxin Zhou, Zhenfu Cao |
Spatial Encryption under Simpler Assumption. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Susan Hohenberger, Brent Waters |
Short and Stateless Signatures from the RSA Assumption. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Hans Georg Schaathun |
On the Assumption of Equal Contributions in Fingerprinting. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Francesca Toni |
Assumption-Based Argumentation for Epistemic and Practical Reasoning. |
Computable Models of the Law, Languages, Dialogues, Games, Ontologies |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Richard C. Hendriks, Jan S. Erkelens, Richard Heusdens |
Comparison of complex-DFT estimators with and without the independence assumption of real and imaginary parts. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Giovanni Di Crescenzo, Helger Lipmaa |
Succinct NP Proofs from an Extractability Assumption. |
CiE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Laurence Anthony F. Park, Kotagiri Ramamohanarao |
Query Expansion for the Language Modelling Framework Using the Naïve Bayes Assumption. |
PAKDD |
2008 |
DBLP DOI BibTeX RDF |
naïve Bayes, language model, query expansion |
21 | Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems |
21 | Dorian Gaertner, Francesca Toni |
Computing Arguments and Attacks in Assumption-Based Argumentation. |
IEEE Intell. Syst. |
2007 |
DBLP DOI BibTeX RDF |
implemented systems, dialectical structure, argumentation |
21 | Antonio Fernández 0001, Ernesto Jiménez, Michel Raynal, Gilles Trédan |
A Timing Assumption and a t-Resilient Protocol for Implementing an Eventual Leader Service in Asynchronous Shared Memory Systems. |
ISORC |
2007 |
DBLP DOI BibTeX RDF |
Timer property, Timing assumptions, Fault-tolerance, Shared memory, System model, Asynchronous system, Process crash, Atomic register, Omega, Eventual leader |
21 | Dorian Gaertner, Francesca Toni |
Preferences and Assumption-Based Argumentation for Conflict-Free Normative Agents. |
ArgMAS |
2007 |
DBLP DOI BibTeX RDF |
argumentation, norms, conflicts, BDI agents |
21 | Yufei Tao 0001, Christos Faloutsos, Dimitris Papadias |
Spatial Query Estimation without the Local Uniformity Assumption. |
GeoInformatica |
2006 |
DBLP DOI BibTeX RDF |
databases, estimation, selectivity, nearest neighbor, range queries |
21 | Daniel Stamate |
Assumption based multi-valued semantics for extended logic programs. |
ISMVL |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Andrew Burton-Jones, Geoffrey S. Hubona |
Individual differences and usage behavior: revisiting a technology acceptance model assumption. |
Data Base |
2005 |
DBLP DOI BibTeX RDF |
IT usage behavior, user acceptance of IT, technology acceptance model, individual differences |
21 | Sergey Tulyakov, Venu Govindaraju |
Using Independence Assumption to Improve Multimodal Biometric Fusion. |
Multiple Classifier Systems |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Alvaro Cortés-Calabuig, Marc Denecker, Ofer Arieli, Bert Van Nuffelen, Maurice Bruynooghe |
On the Local Closed-World Assumption of Data-Sources. |
LPNMR |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern |
RSA-OAEP Is Secure under the RSA Assumption. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
RSA, Provable security, Public-key encryption, OAEP |
21 | Marie Duflot, Laurent Fribourg, Claudine Picaronny |
Randomized dining philosophers without fairness assumption. |
Distributed Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern |
RSA-OAEP Is Secure under the RSA Assumption. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Giorgio Marchetti |
Observation levels and units of time: A critical analysis of the main assumption of the theory of the artificial. |
AI Soc. |
2000 |
DBLP DOI BibTeX RDF |
Category mistake, Knowledge production, Mental activity, Observation level, Theory of the artificial |
21 | Zhouchen Lin, Heung-Yeung Shum |
On the Number of Samples Needed in Light Field Rendering with Constant-Depth Assumption. |
CVPR |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Ivan Damgård, Jesper Buus Nielsen |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Qiwen Xu, Swarup Mohalik |
Compositional Reasoning Using the Assumption-Commitment Paradigm. |
COMPOS |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Michael Kaminski, Johann A. Makowsky, Michael L. Tiomkin |
Extensions for Open Default Theories via the Domain Closure Assumption. |
JELIA |
1996 |
DBLP DOI BibTeX RDF |
|
21 | Bengt Jonsson 0001, Yih-Kuen Tsay |
Assumption/Guarantee Specifications in Linear-Time Temporal Logic (Extended Abstract). |
TAPSOFT |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Dietmar Seipel |
An Efficient Computation of Extended Generalized Closed World Assumption by Support-for-Negation Sets. |
LPAR |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Uri Abraham, Shai Ben-David, Shlomo Moran |
On the Limitation of the Global Time Assumption in Distributed Systems (Extended Abstract). |
WDAG |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Shin-ichi Wada, Yoshiyuki Koseki |
An assumption-based localization technique for switching system. |
IEA/AIE (1) |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Jack Minker |
On Indefinite Databases and the Closed World Assumption. |
CADE |
1982 |
DBLP DOI BibTeX RDF |
|
19 | Jin Li 0002, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren 0001 |
Attribute-based signature and its applications. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
attribute-based, computational Diffie-Hellman assumption, anonymity, signature, predicate |
19 | Tao Lin, Sheqin Dong, Bei Yu 0001, Song Chen 0001, Satoshi Goto |
A revisit to voltage partitioning problem. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
quasiconvex assumption, voltage partition |
19 | Rui Xue 0001, Ninghui Li, Jiangtao Li 0001 |
Algebraic Construction for Zero-Knowledge Sets. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
zero knowledge set, accumulator strong RSA assumption, random oracle, Merkle tree |
Displaying result #1 - #100 of 8337 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|