Sciweavers

20 search results - page 2 / 4
» Does the Extended Technology Acceptance Model Apply to Physi...
Sort
View
ISW
2007
Springer
13 years 11 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
WSC
2000
13 years 6 months ago
Enterprise Simulation: framework for a strategic application
The term Enterprise Simulation (ES) is gaining acceptance among simulation practitioners. It is coming to represent certain tangible attributes, and its benefits seem apparent in ...
Milind M. Datar
WISE
2003
Springer
13 years 10 months ago
Service-Oriented Computing: Concepts, Characteristics and Directions
Service-Oriented Computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications/solutions. To build the service model, SOC re...
Mike P. Papazoglou
BMCBI
2004
185views more  BMCBI 2004»
13 years 5 months ago
Linear fuzzy gene network models obtained from microarray data by exhaustive search
Background: Recent technological advances in high-throughput data collection allow for experimental study of increasingly complex systems on the scale of the whole cellular genome...
Bahrad A. Sokhansanj, J. Patrick Fitch, Judy N. Qu...
SEFM
2006
IEEE
13 years 11 months ago
Product Automata and Process Algebra
We define a model of labelled product systems of automata and explore its connections with process calculi and trace languages. Bisimilarity of labelled product systems is defin...
Kamal Lodaya