Sciweavers

7623 search results - page 1299 / 1525
» Constructive Volume Modeling
Sort
View
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
131
Voted
SEM
2004
Springer
15 years 9 months ago
Supporting Generalized Context Interactions
Abstract. Context-awareness refers to a computing model where application behavior is driven by a continually-changing environment. Mobile computing poses unique challenges to cont...
Gregory Hackmann, Christine Julien, Jamie Payton, ...
SEMWEB
2004
Springer
15 years 9 months ago
Generating On the Fly Queries for the Semantic Web: The ICS-FORTH Graphical RQL Interface (GRQL)
Abstract. Building user-friendly GUIs for browsing and filtering RDF/S description bases while exploiting in a transparent way the expressiveness of declarative query/view language...
Nikolaos Athanasis, Vassilis Christophides, Dimitr...
SIGADA
2004
Springer
15 years 9 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
WWW
2010
ACM
15 years 9 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
« Prev « First page 1299 / 1525 Last » Next »