Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Scheme

Known as: R5RS Scheme, Scheme progamming language, R4RS 
Scheme is a functional programming language and one of the two main dialects of the programming language Lisp. Unlike Common Lisp, the other main… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2008
Review
2008
This paper overviews the recent work on compressive sensing, a new approach to data acquisition in which analog signals are… Expand
Highly Cited
2007
Highly Cited
2007
This paper details a content analysis scheme to measure the quality of political deliberation in face-to-face and online groups… Expand
Highly Cited
2004
Highly Cited
2004
In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid… Expand
  • table 1
Highly Cited
2003
Highly Cited
2003
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
For the past few years almost every manufacturing industry has been trying to get 'lean'. A headlong rush to become lean also… Expand
Highly Cited
2002
Highly Cited
2002
DrScheme is a programming environment for Scheme. It fully integrates a graphics-enriched editor, a parser for multiple variants… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2000
Highly Cited
2000
We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key… Expand
Highly Cited
1999
Highly Cited
1999
Summary In topology optimization of structures, materials and mechanisms, parametrization of geometry is often performed by a… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Highly Cited
1988
Highly Cited
1988
At EUROCRYPT'88, we introduced an interactive zero-knowledge protocol (Guillou and Quisquater [13]) fitted to the authentication… Expand
Highly Cited
1985
Highly Cited
1985
From the Publisher: With an analytical and rigorous approach to problem solving and programming techniques,this book is oriented… Expand
  • figure 1.1
  • figure 1.2
  • figure 1.3
  • figure 1.4
  • figure 1.5