Sciweavers

2028 search results - page 399 / 406
» Deriving Relation Keys from XML Keys
Sort
View
DC
2007
14 years 11 months ago
On private computation in incomplete networks
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
Amos Beimel
JUCS
2008
120views more  JUCS 2008»
14 years 11 months ago
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
: In communication systems that guarantee seamless mobility of users across service areas, repeated attempts occur as a result of user behavior but also as automatic retries of blo...
José Manuel Giménez-Guzmán, M...
MCS
2008
Springer
14 years 11 months ago
Error analysis of a stochastic immersed boundary method incorporating thermal fluctuations
A stochastic numerical scheme for an extended immersed boundary method which incorporates thermal fluctuations for the simulation of microscopic biological systems consisting of fl...
Paul J. Atzberger, Peter R. Kramer
JUCS
2006
135views more  JUCS 2006»
14 years 11 months ago
Operational/Interpretive Unfolding of Multi-adjoint Logic Programs
Abstract: Multi-adjoint logic programming represents a very recent, extremely flexible attempt for introducing fuzzy logic into logic programming. In this setting, the execution of...
Pascual Julián, Ginés Moreno, Jaime ...
MTA
2008
186views more  MTA 2008»
14 years 11 months ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl