Sciweavers

6607 search results - page 231 / 1322
» Making TeX Work
Sort
View
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 9 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
COCOON
2005
Springer
15 years 9 months ago
A Quadratic Lower Bound for Rocchio's Similarity-Based Relevance Feedback Algorithm
Rocchio’s similarity-based relevance feedback algorithm, one of the most important query reformation methods in information retrieval, is essentially an adaptive supervised lear...
Zhixiang Chen, Bin Fu
DIGRA
2005
Springer
15 years 9 months ago
Albert Goes Narrative Contracting
RPG’s (Role Playing Games) and improvisational theatre have some obvious similarities. Both require the participants to work together in real-time to construct dynamic narrative...
Ken Newman, Robert Grigg
118
Voted
DSOM
2005
Springer
15 years 9 months ago
Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL
Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Antonio Guerrero, Víctor A. Villagrá...
PVM
2005
Springer
15 years 9 months ago
Designing a Common Communication Subsystem
Communication subsystems are used in high-performance parallel computing systems to abstract the lower network layer. By using a communication subsystem, an upper middleware librar...
Darius Buntinas, William Gropp