Sciweavers

8190 search results - page 1603 / 1638
» From Timed to Hybrid Systems
Sort
View
ACISP
2004
Springer
15 years 7 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
EGOV
2004
Springer
15 years 7 months ago
Software Acquisition Based on Business Models
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
Peter Regner, Thomas Wiesinger, Josef Küng, R...
100
Voted
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
15 years 7 months ago
A Pull-Based Approach for a VoD Service in P2P Networks
We study a new approach to provide an efficient VoD service to a large client population in P2P networks. Previous work has suggested to construct a multicast tree to distribute t...
Anwar Al Hamra, Ernst W. Biersack, Guillaume Urvoy...
ICADL
2004
Springer
115views Education» more  ICADL 2004»
15 years 7 months ago
PaSE: Locating Online Copy of Scientific Documents Effectively
The need for fast and vast dissemination of research results has led a new trend such that more number of authors post their documents to personal or group Web spaces so that other...
Byung-Won On, Dongwon Lee
ICWE
2004
Springer
15 years 7 months ago
Automatic Interpretation of Natural Language for a Multimedia E-learning Tool
Abstract. This paper describes the new e-learning tool CHESt that allows students to search in a knowledge base for short (teaching) multimedia clips by using a semantic search eng...
Serge Linckels, Christoph Meinel
« Prev « First page 1603 / 1638 Last » Next »