Sciweavers

21430 search results - page 3949 / 4286
» Abstract Effective Models
Sort
View
CORR
2007
Springer
122views Education» more  CORR 2007»
15 years 4 months ago
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Abstract. Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close o...
Shengbao Wang
IJWET
2006
89views more  IJWET 2006»
15 years 4 months ago
Enforcing web services business protocols at run-time: a process-driven approach
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Biörn Biörnstad, Cesare Pautasso, Gustav...
IJWIS
2006
87views more  IJWIS 2006»
15 years 4 months ago
Systematic Development of Physical Hypermedia Applications
Abstract. In this paper we present a model-based approach for the development of physical hypermedia applications, i.e. those mobile (Web) applications in which physical and digita...
Cecilia Challiol, Gustavo Rossi, Silvia E. Gordill...
INFORMATICALT
2006
129views more  INFORMATICALT 2006»
15 years 4 months ago
On the Identification of Hammerstein Systems Having Saturation-like Functions with Positive Slopes
Abstract. The aim of the given paper is the development of an approach for parametric identification of Hammerstein systems with piecewise linear nonlinearities, i.e., when the sat...
Rimantas Pupeikis
IR
2006
15 years 4 months ago
Full-text federated search of text-based digital libraries in peer-to-peer networks
Abstract. Peer-to-peer (P2P) networks integrate autonomous computing resources without requiring a central coordinating authority, which makes them a potentially robust and scalabl...
Jie Lu, Jamie Callan
« Prev « First page 3949 / 4286 Last » Next »