Sciweavers

18090 search results - page 3528 / 3618
» Computing by Only Observing
Sort
View
DIM
2005
ACM
15 years 5 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
COMPSAC
2007
IEEE
15 years 5 months ago
Towards End User Service Composition
The popularity of Service Oriented Computing (SOC) brings a large number of distributed, well-encapsulated and reusable services all over internet, and makes it possible to create...
Xuanzhe Liu, Gang Huang, Hong Mei
CLEF
2008
Springer
15 years 5 months ago
UJM at ImageCLEFwiki 2008
This paper reports our multimedia information retrieval experiments carried out for the ImageCLEF track (ImageCLEFwiki). The task is to answer to user information needs, i.e. quer...
Christophe Moulin, Cécile Barat, Mathias G&...
CODES
2008
IEEE
15 years 5 months ago
Performance debugging of Esterel specifications
Synchronous languages like Esterel have been widely adopted for designing reactive systems in safety-critical domains such as avionics. Specifications written in Esterel are based...
Lei Ju, Bach Khoa Huynh, Abhik Roychoudhury, Samar...
138
Voted
CPM
2008
Springer
134views Combinatorics» more  CPM 2008»
15 years 5 months ago
An Improved Succinct Representation for Dynamic k-ary Trees
Abstract. k-ary trees are a fundamental data structure in many textprocessing algorithms (e.g., text searching). The traditional pointer-based representation of trees is space cons...
Diego Arroyuelo
« Prev « First page 3528 / 3618 Last » Next »