Sciweavers

49 search results - page 10 / 10
» A note on the substructural hierarchy
Sort
View
CCS
2001
ACM
13 years 9 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
DIAGRAMS
2008
Springer
13 years 7 months ago
Diagrams in the UK National School Curriculum
Abstract. We review the use of diagrams in the UK National School Curriculum (NC) and assess it in the light of current research on childrens' graph comprehension. It is noted...
Grecia Garcia Garcia, Richard Cox
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 6 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
NRHM
2000
149views more  NRHM 2000»
13 years 5 months ago
Navigable history: a reader's view of writer's time
Collecting, analyzing, and sharing information via a hypertext results in the continuous modification of information content over a long period of time. Such tasks will benefit fr...
Frank M. Shipman III, Hao-wei Hsieh