Sciweavers

1017 search results - page 168 / 204
» Conceptual Design
Sort
View
ISW
2004
Springer
15 years 3 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
MATES
2004
Springer
15 years 3 months ago
C-IPS: Specifying Decision Interdependencies in Negotiations
Negotiation is an important mechanism of coordination in multiagent systems. Contrary to early conceptualizations of negotiating agents, we believe that decisions regarding the neg...
Kay Schröter, Diemo Urbig
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 3 months ago
Modeling and Analyzing Communications Infrastructure A Case Study of an International Organization
EnCompass®1 , a web-enabled system for organizational process visualization, analysis, synthesis, and management, provides an interactive vehicle for understanding the influence ...
Michael M. Mann, Ericka Hansen Bryant
ASP
2003
Springer
15 years 3 months ago
Mappings Between Domain Models in Answer Set Programming
Integration of data is required when accessing multiple databases within an organization or on the WWW. Schema integration is required for database interoperability, but it is curr...
Stefania Costantini, Andrea Formisano, Eugenio G. ...
HICSS
2002
IEEE
85views Biometrics» more  HICSS 2002»
15 years 2 months ago
Just What Do the Youth of Today Want? Technology Appropriation by Young People
What do young people want from information and communication technology? Why do they adopt some technologies but reject others? What roles do mobile technologies play in their liv...
Jenny M. Carroll, Steve Howard, Frank Vetere, Jane...