Sciweavers

118 search results - page 23 / 24
» Designing with and for children with special needs: an inclu...
Sort
View
AIPS
2009
13 years 6 months ago
Flexible Execution of Plans with Choice
Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties while improving robustness and reducing the need for an overly conservative plan. Executive...
Patrick R. Conrad, Julie A. Shah, Brian C. William...
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
BMCBI
2006
103views more  BMCBI 2006»
13 years 5 months ago
Meta-All: a system for managing metabolic pathway information
Background: Many attempts are being made to understand biological subjects at a systems level. A major resource for these approaches are biological databases, storing manifold inf...
Stephan Weise, Ivo Grosse, Christian Klukas, Dirk ...
IJHPCA
2007
114views more  IJHPCA 2007»
13 years 5 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
ACSAC
2001
IEEE
13 years 9 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç