Sciweavers

2625 search results - page 168 / 525
» Applications 2000
Sort
View
FLAIRS
2000
15 years 5 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
CSUR
2000
43views more  CSUR 2000»
15 years 3 months ago
Domain-driven framework layering in large systems
Frameworks are the key to successful object-oriented application development. The goal of this paper is to show that successful framework development must match the business domai...
Dirk Bäumer, Guido Gryczan, Rolf Knoll, Carol...
SODA
2000
ACM
102views Algorithms» more  SODA 2000»
15 years 5 months ago
Escaping a grid by edge-disjoint paths
We study the edge-disjoint escape problem in grids. Given a set of n sources in a two-dimensional grid, the problem is to connect all sources to the grid boundary using a set of n...
Wun-Tat Chan, Francis Y. L. Chin, Hing-Fung Ting
DARS
2000
Springer
128views Robotics» more  DARS 2000»
15 years 8 months ago
Collective Grounded Representations for Robots
Realistic applications of autonomous Robotics face a lot of difficulties in real environments. To navigate, self-localize and cooperate in such contexts, a multi-robot system has t...
Louis Hugues
SARA
2000
Springer
15 years 7 months ago
GIS Databases: From Multiscale to MultiRepresentation
Cartography is one of the major application areas using geographical databases. Whether it is for the business of producing paper maps for sale, or whether it is for displaying map...
Stefano Spaccapietra, Christine Parent, Christelle...