Sciweavers

195 search results - page 17 / 39
» Hiding the complexity of LBS
Sort
View
SPLC
2010
15 years 3 months ago
Consistent Product Line Configuration across File Type and Product Line Boundaries
Creating a valid software configuration of a product line can require laborious customizations involving multiple configuration file types, such as feature models, domain-specific ...
Christoph Elsner, Peter Ulbrich, Daniel Lohmann, W...
121
Voted
ICISC
2008
126views Cryptology» more  ICISC 2008»
15 years 3 months ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...
117
Voted
PERVASIVE
2008
Springer
15 years 1 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
101
Voted
JPDC
2010
117views more  JPDC 2010»
15 years 7 days ago
Extensible transactional memory testbed
Transactional Memory (TM) is a promising abstraction as it hides all synchronization complexities from the programmers of concurrent applications. More particularly the TM paradig...
Derin Harmanci, Vincent Gramoli, Pascal Felber, Ch...
GI
2010
Springer
14 years 11 months ago
Reusable Interaction Protocols for Workflows
With the advent of collaborative business processes that may include different parties, the interaction means between those processes steadily gains more importance. Despite this i...
Alexander Pokahr, Lars Braubach