Sciweavers

2061 search results - page 189 / 413
» Authorization for Metacomputing Applications
Sort
View
CAGD
2006
97views more  CAGD 2006»
15 years 4 months ago
Conditions for use of a non-selfintersection conjecture
Abstract. Volino and Thalmann have published a conjecture proposing sufficient conditions for non-selfintersection of surfaces. Such conditions may be used in solid modeling, compu...
Lars-Erik Andersson, Neil F. Stewart, Malika Zidan...
ENTCS
2006
127views more  ENTCS 2006»
15 years 4 months ago
Capability-Passing Processes
Capability passing processes model global applications in a way that decouples the global agreement aspects of protocols from the details of how the communications are actually ma...
Tom Chothia, Dominic Duggan
143
Voted
IJBIDM
2008
114views more  IJBIDM 2008»
15 years 4 months ago
Traffic mining in a road-network: How does the traffic flow?
: The flow of data coming from modern sensing devices enables the development of novel research techniques related to data management and knowledge extraction. In this work, we und...
Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos
IJET
2008
86views more  IJET 2008»
15 years 4 months ago
A Delivery Engine for QTI Assessments
The IMS Question and Test Interoperability (QTI) standard has had a restricted take-up, in part due to the lack of tools. This paper describes the `ASDEL' test delivery engine...
Gary B. Wills, Jonathon S. Hare, Jiri Kajaba, Davi...
JSS
2008
97views more  JSS 2008»
15 years 4 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...