Sciweavers

696 search results - page 103 / 140
» Explaining abstract counterexamples
Sort
View
ESWS
2007
Springer
15 years 7 months ago
Towards Semantic Social Networks
Abstract. Computer manipulated social networks are usually built from the explicit assertion by users that they have some relation with other users or by the implicit evidence of s...
Jason J. Jung, Jérôme Euzenat
124
Voted
GI
2007
Springer
15 years 7 months ago
What is Ubiquitous about Ubiquitous Computing? - Space, Technology, Surveillance, and Behaviour
: Discussing ubiquitous computing, the role of space is not quite clear. To get an understanding of the thinking on space, the main concepts of absolute, relational, and social spa...
Martin Klamt
ARCS
2004
Springer
15 years 7 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
ASIAN
2006
Springer
118views Algorithms» more  ASIAN 2006»
15 years 7 months ago
An Approach to Formal Verification of Arithmetic Functions in Assembly
Abstract. It is customary to write performance-critical parts of arithmetic functions in assembly: this enables finely-tuned algorithms that use specialized processor instructions....
Reynald Affeldt, Nicolas Marti
CIE
2006
Springer
15 years 7 months ago
Forcing with Random Variables and Proof Complexity
or representation theory of groups), and even borrows abstract geometrical concepts like Euler characteristic or Grothendieck ring. However, the most stimulating for proof complexi...
Jan Krajícek