Sciweavers

1432 search results - page 124 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
ICWE
2009
Springer
15 years 8 months ago
Conceptual Modeling of Multimedia Search Applications Using Rich Process Models
With the advent of the Web, search has become the prominent paradigm for information seeking, not only across the online space but also within enterprises. Search engine functiona...
Alessandro Bozzon, Marco Brambilla, Piero Fraterna...
131
Voted
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
GLOBECOM
2010
IEEE
15 years 1 months ago
Cognitive Network Inference through Bayesian Network Analysis
Cognitive networking deals with applying cognition to the entire network protocol stack for achieving stack-wide as well as network-wide performance goals, unlike cognitive radios ...
Giorgio Quer, Hemanth Meenakshisundaram, Tamma Bhe...
AOSD
2003
ACM
15 years 8 months ago
JAsCo: an aspect-oriented approach tailored for component based software development
In this paper we introduce a novel aspect oriented implementation language, called JAsCo. JAsCo is tailored for component based development and the Java Beans component model in p...
Davy Suvée, Wim Vanderperren, Viviane Jonck...
110
Voted
VAMOS
2007
Springer
15 years 9 months ago
Challenges in the Application of Feature Modelling in Fixed Line Telecommunications
The global telephone system is a complex transmission network, the features of which are defined to a very high level by ITU-T standards. It is therefore a prime candidate at whi...
Charles Gillan, Peter Kilpatrick, Ivor T. A. Spenc...