Sciweavers

4498 search results - page 273 / 900
» How to Invent Functions
Sort
View
156
Voted
INTERACT
1997
15 years 6 months ago
Storing and Retrieving Documents in a Shared Workspace: Experiences from the Political Administration
In the following we will describe experiences made when introducing a shared workspace in a German federal ministry to support the cooperative typing of documents. It will be shown...
Volker Wulf
ENTCS
2008
116views more  ENTCS 2008»
15 years 4 months ago
Computational Origami Construction as Constraint Solving and Rewriting
Computational origami is the computer assisted study of mathematical and computational aspects of origami. An origami is constructed by a finite sequence of fold steps, each consi...
Tetsuo Ida, Mircea Marin, Hidekazu Takahashi, Fado...
IJACT
2008
101views more  IJACT 2008»
15 years 4 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
ENTCS
2006
141views more  ENTCS 2006»
15 years 4 months ago
Verification of Distributed Hierarchical Components
Components allow to design applications in a modular way by enforcing a strong separation of concerns. In distributed systems this separation of concerns have to be composed with ...
Tomás Barros, Ludovic Henrio, Eric Madelain...
ESWA
2006
99views more  ESWA 2006»
15 years 4 months ago
Assessing a knowledge-based approach to commercial loan underwriting
We discuss the challenges in developing decision support tools for commercial underwriting and describe how several different approaches to the underwriting problem have been addr...
Roger Kumra, Roger M. Stein, Ian Assersohn