Sciweavers

1810 search results - page 332 / 362
» BASE: Using Abstraction to Improve Fault Tolerance
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
14 years 11 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
ECTEL
2010
Springer
14 years 10 months ago
Knowledge Maturing Activities and Practices Fostering Organisational Learning: Results of an Empirical Study
Abstract. Knowledge work is performed in all occupations and across all industries. The level of similarity of knowledge work allows for designing supporting tools that can be wide...
Andreas Kaschig, Ronald Maier, Alexander Sandow, M...
GISCIENCE
2008
Springer
141views GIS» more  GISCIENCE 2008»
14 years 10 months ago
Simplest Instructions: Finding Easy-to-Describe Routes for Navigation
Abstract. Current applications for wayfinding and navigation assistance usually calculate the route to a destination based on the shortest or fastest path from the origin. However...
Kai-Florian Richter, Matt Duckham
48
Voted
COMCOM
2006
56views more  COMCOM 2006»
14 years 9 months ago
Retransmission policies for multihomed transport protocols
Abstract-- We evaluate three retransmission policies for transport protocols that support multihoming (e.g., SCTP). The policies dictate whether retransmissions are sent to the sam...
Armando L. Caro Jr., Paul D. Amer, Randall R. Stew...
71
Voted
CORR
2006
Springer
138views Education» more  CORR 2006»
14 years 9 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...