Sciweavers

14386 search results - page 2717 / 2878
» Algorithms for user interfaces
Sort
View
CONCUR
2007
Springer
15 years 8 months ago
Temporal Antecedent Failure: Refining Vacuity
We re-examine vacuity in temporal logic model checking. We note two disturbing phenomena in recent results in this area. The first indicates that not all vacuities detected in prac...
Shoham Ben-David, Dana Fisman, Sitvanit Ruah
DAC
2007
ACM
15 years 8 months ago
Integrated Droplet Routing in the Synthesis of Microfluidic Biochips
Microfluidic biochips are revolutionizing many areas of biochemistry and biomedical sciences. Several synthesis tools have recently been proposed for the automated design of bioch...
Tao Xu, Krishnendu Chakrabarty
WEBDB
2010
Springer
238views Database» more  WEBDB 2010»
15 years 8 months ago
An Agglomerative Query Model for Discovery in Linked Data: Semantics and Approach
Data on the Web is increasingly being used for discovery and exploratory tasks. Unlike traditional fact-finding tasks that require only the typical single-query and response parad...
Sidan Gao, Haizhou Fu, Kemafor Anyanwu
DOCENG
2007
ACM
15 years 8 months ago
Preserving the aesthetics during non-fixed aspect ratio scaling of the digital border
To enhance the visual effect of a photo, various digital borders or frames are provided for photo decoration at photo sharing websites. Even though multiple versions of the same b...
Hui Chao, Prasad Gabbur, Anthony Wiley
AINA
2007
IEEE
15 years 7 months ago
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key ...
Ki-Woong Park, Hyunchul Seok, Kyu Ho Park
« Prev « First page 2717 / 2878 Last » Next »