Sciweavers

1691 search results - page 90 / 339
» Accommodating Context Change
Sort
View
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 4 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
ECOOP
1998
Springer
15 years 4 months ago
Wrappers to the Rescue
Wrappers are mechanisms for introducing new behavior that is executed before and/or after, and perhaps even in lieu of, an existing method. This paper examines several ways to impl...
John Brant, Brian Foote, Ralph E. Johnson, Don Rob...
CCGRID
2004
IEEE
15 years 3 months ago
High performance LU factorization for non-dedicated clusters
This paper describes an implementation of parallel LU factorization. The focus is to achieve high performance on non-dedicated clusters, where the number of available computing re...
Toshio Endo, Kenji Kaneda, Kenjiro Taura, Akinori ...
LREC
2008
134views Education» more  LREC 2008»
15 years 1 months ago
Evaluating the Ontology underlying sMail - the Conceptual Framework for Semantic Email Communication
The lack of structure in the content of email messages makes it very hard for data channelled between the sender and the recipient to be correctly interpreted and acted upon. As a...
Simon Scerri, Myriam Mencke, Brian Davis, Siegfrie...
AAAI
1994
15 years 1 months ago
Automatically Tuning Control Systems for Simulated Legged Robots
Rather than create a control system from scratch each time we build a new robot creature, we would like to generate control systems automatically. I have implemented an algorithm ...
Robert Ringrose