Sciweavers

1884 search results - page 258 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
109
Voted
ISPA
2004
Springer
15 years 7 months ago
A Peer-to-Peer Mechanism for Resource Location and Allocation Over the Grid
Abstract. Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resourc...
Hung-Chang Hsiao, Mark Baker, Chung-Ta King
EWCBR
2006
Springer
15 years 5 months ago
Supplementing Case-based Recommenders with Context Data
Abstract. We propose that traditional case-based recommender systems can be improved by informing them with context data describing the user's environment. We outline existing...
Lorcan Coyle, Evelyn Balfe, Graeme Stevenson, Stev...
FC
2005
Springer
133views Cryptology» more  FC 2005»
15 years 7 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 7 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...
ICSE
1999
IEEE-ACM
15 years 5 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith