Sciweavers

154 search results - page 23 / 31
» A Joint Model for Extended Semantic Role Labeling
Sort
View
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
IC
2007
14 years 11 months ago
Gordon Surface Modeling in a Network Environment
—With the advent of the Internet, we have entered the age of ubiquitous systems that will need to be able to communicate, establish criteria for measurement and then perform thes...
Jan Smid, Petr Volf
IEEESCC
2005
IEEE
15 years 3 months ago
Web Services Composition: A Story of Models, Automata, and Logics
eal world”, represented abstractly using (time-varying) first-order logic predicates and terms. A representative composition result [11] here uses a translation into Petri nets. ...
Richard Hull
CAISE
2006
Springer
15 years 1 months ago
Adaptive Query Formulation to Handle Database Evolution
Databases are continuously evolving environments, where design constructs are added, removed or updated quite often. Research has extensively dealt with the problem of database evo...
George Papastefanatos, Panos Vassiliadis, Yannis V...
CL
2000
Springer
15 years 1 months ago
Concurrent Constraint Programming with Process Mobility
Abstract. We propose an extension of concurrent constraint programming with primitives for process migration within a hierarchical network, and we study its semantics. To this purp...
David Gilbert, Catuscia Palamidessi