Sciweavers

13277 search results - page 2632 / 2656
» An Approach to Clustering Abstracts
Sort
View
JOC
2000
181views more  JOC 2000»
15 years 15 days ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
101
Voted
GIS
2002
ACM
15 years 14 days ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller
ACTA
1998
81views more  ACTA 1998»
15 years 12 days ago
Dijkstra-Scholten Predicate Calculus: Concepts and Misconceptions
The paper focusses on the logical backgrounds of the Dijkstra-Scholten program development style for correct programs. For proving the correctness of a program (i.e. the fact that...
Lex Bijlsma, Rob Nederpelt
CGA
1998
15 years 12 days ago
Principles for Information Visualization Spreadsheets
ns, with large, abstract, multidimensional data sets that are visually represented in multiple ways. We illustrate how spreadsheet techniques provide a structured, intuitive, and p...
Ed Huai-hsin Chi, John Riedl, Phillip Barry, Josep...
99
Voted
IJMMS
2002
108views more  IJMMS 2002»
15 years 11 days ago
Modelling multiple mind-matter interaction
Relations between mental and physical aspects of an agent can be of various types. Sensing and acting are among the more commonly modelled types. In agent modelling approaches ofte...
Catholijn M. Jonker, Jan Treur
« Prev « First page 2632 / 2656 Last » Next »