Sciweavers

620 search results - page 100 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
LANMR
2007
14 years 11 months ago
Dialetheic truth theory: inconsistency, non-triviality, soundness, incompleteness
The best-known application of dialetheism is to semantic paradoxes such as the Liar. In particular, Graham Priest has advocated the adoption of an axiomatic truth theory in which c...
Federico Marulanda Rey
SEBD
2008
170views Database» more  SEBD 2008»
14 years 11 months ago
A platform for model-independent solutions to model management problems
Abstract. Model management is a metadata-based approach to database problems aimed at supporting the productivity of developers by providing schema manipulation operators. Here we ...
Paolo Atzeni, Luigi Bellomarini, Francesca Bugiott...
SYRCODIS
2008
135views Database» more  SYRCODIS 2008»
14 years 11 months ago
Realizing Fine-Granular and Scalable Transaction Isolation in Native XML Databases
Based on loosely coupled services in an XML engine, we describe how to realize fine-grained lock protocols, which can guarantee transaction isolation for applications using differ...
Sebastian Bächle, Theo Härder
WEBIST
2008
14 years 11 months ago
A Web-Based Version of a Trivial Game to Promote Galician Culture
We present in this paper the architecture and some implementation details of a web-based version of a Trivial game. Our implementation achieves such a high degree of interactivity ...
Miguel Rodríguez Luaces, Oscar Pedreira, &A...
83
Voted
AAAI
2004
14 years 11 months ago
CMRadar: A Personal Assistant Agent for Calendar Management
Abstract. Personal assistant agents have long promised to automate routine everyday tasks in order to reduce the cognitive load on humans. One such routine task is the management o...
Pragnesh Jay Modi, Manuela M. Veloso, Stephen F. S...