Sciweavers

7118 search results - page 910 / 1424
» Electrical and Computer Engineering
Sort
View
134
Voted
TGC
2005
Springer
15 years 10 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
113
Voted
WEBI
2005
Springer
15 years 10 months ago
Opportunities from Open Source Search
Internet search has a strong business model that permits a free service to users, so it is difficult to see why, if at all, there should be open source offerings as well. This pa...
Wray L. Buntine, Karl Aberer, Ivana Podnar, Martin...
EUC
2005
Springer
15 years 10 months ago
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario
Many sensors providing situation data will be in everywhere under the ubiquitous environment. It requires the current RFID system should be extended to recognize and use situation ...
Dongwon Jeong, Heeseo Chae, Hoh Peter In
GCC
2005
Springer
15 years 10 months ago
Characterizing Services Composeability and OWL-S Based Services Composition
Grid has emerged as a new paradigm for integration within dynamic virtual enterprises. Given a service-oriented Grid environment, more complex, value-added sophisticated services a...
Zhonghua Yang, Jing-Bing Zhang, Jiao Tao, Robert K...
141
Voted
ACMDIS
2004
ACM
15 years 10 months ago
Communication functions and the adaptation of design representations in interdisciplinary teams
Design representations in user-centered design serve intentions for directing design process and communication functions for enlisting interdisciplinary participation. To disentan...
David G. Hendry