Sciweavers

2421 search results - page 103 / 485
» Message from the Editor-in-Chief
Sort
View
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 7 months ago
Challenges of Adopting Web Services: Experiences from the Financial Industry
Despite the many expected benefits of Web services technology, some organizations are hesitating to adopt Web services on a larger scale and across their organizational boundaries...
Andrew P. Ciganek, Marc N. Haines, William (Dave) ...
ERCIMDL
1999
Springer
146views Education» more  ERCIMDL 1999»
15 years 6 months ago
Metadata for Photographs: From Digital Library to Multimedia Application
This paper describes the production of an educational multimedia CD-ROM about French rural houses and farms, and how to renovate them without losing their traditional features. Th...
Anne-Marie Vercoustre, François Paradis
RTCSA
1998
IEEE
15 years 5 months ago
Protocol Synthesis from Context-Free Processes Using Event Structures
In this paper, we propose a protocol synthesis method based on a partial order model (called event structures) for the class of context-free processes. First, we assign a unique n...
Akio Nakata, Teruo Higashino, Kenichi Taniguchi
CORR
2007
Springer
156views Education» more  CORR 2007»
15 years 1 months ago
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Abstract—Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state inform...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 2 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...