Sciweavers

1540 search results - page 157 / 308
» Automotive System Design - Challenges and Potential
Sort
View
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 4 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
WDAG
2005
Springer
92views Algorithms» more  WDAG 2005»
15 years 3 months ago
Plausible Clocks with Bounded Inaccuracy
In a distributed system with N processes, time stamps of size N (such as vector clocks) are necessary to accurately track potential causality between events. Plausible clocks are a...
Brad T. Moore, Paolo A. G. Sivilotti
DIAGRAMS
2004
Springer
15 years 3 months ago
Cider: A Component-Based Toolkit for Creating Smart Diagram Environments
— Smart Diagram Environments (SDEs) are software applications that use structured diagrams to provide a natural visual interface that behaves as if the computer “understands”...
Anthony R. Jansen, Kim Marriott, Bernd Meyer
CDC
2009
IEEE
15 years 2 months ago
Interaction of service providers in task delegation under simple payment rules
— We consider a scenario where an application service provider (ASP) hires a network service provider (NSP) to deliver its service and pays for the employment of the NSP. We stud...
Richard J. La, Jeonghoon Mo
GROUP
1997
ACM
15 years 2 months ago
Bridging the gap between face-to-face communication and long-term collaboration
During the different phases of a project, stakeholders have different communication needs and make use of different communication media to satisfy them. A group memory system must...
Stefanie N. Lindstaedt, Kurt Schneider