Sciweavers

1377 search results - page 143 / 276
» Inference and Information Resources: A Design Case Study
Sort
View
ENTCS
2007
89views more  ENTCS 2007»
14 years 10 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang
MSR
2010
ACM
15 years 3 months ago
Identifying licensing of jar archives using a code-search approach
—Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode...
Massimiliano Di Penta, Daniel M. Germán, Gi...
CAD
2008
Springer
14 years 10 months ago
Tracking product specification dependencies in collaborative design for conflict management
The main difficulty associated with a collaborative design process is understanding the product data exchanged during design. Efficient and effective coordination of design activi...
Mohamed-Zied Ouertani, Lilia Gzara Yesilbas
MUM
2004
ACM
99views Multimedia» more  MUM 2004»
15 years 3 months ago
The Road Rager: making use of traffic encounters in a mobile multiplayer game
We present Road Rager, a prototype built in order to explore our hypothesis that proximity and a possibility to identify other players during temporary encounters could spur socia...
Liselott Brunnberg
CAI
2002
Springer
14 years 9 months ago
The Computing and Data Grid Approach: Infrastructure for Distributed Science Applications
Grid technology has evolved over the past several years to provide the services and infrastructure needed for building "virtual" systems and organizations. With this Gri...
William E. Johnston