Sciweavers

620 search results - page 64 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 3 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
ER
2004
Springer
219views Database» more  ER 2004»
15 years 3 months ago
An Agent-Based Approach for Interleaved Composition and Execution of Web Services
The emerging paradigm of web services promises to bring to distributed computing the same flexibility that the web has brought to the publication and search of information contain...
Xiaocong Fan, Karthikeyan Umapathy, John Yen, Sand...
WEBDB
2010
Springer
171views Database» more  WEBDB 2010»
15 years 2 months ago
Improved Recommendations via (More) Collaboration
We consider in this paper a popular class of recommender systems that are based on Collaborative Filtering (CF for short). CF is the process of predicting customer ratings to item...
Rubi Boim, Haim Kaplan, Tova Milo, Ronitt Rubinfel...
ISESE
2002
IEEE
15 years 2 months ago
Verification and Validation in Industry -- A Qualitative Survey on the State of Practice
Verification and validation activities take a substantial share of project budgets and need improvements. This is an accepted truth, but the current practices are seldom assessed ...
Carina Andersson, Per Runeson
ECTEL
2008
Springer
14 years 11 months ago
A Supporting Architecture for Generic Service Integration in IMS Learning Design
Abstract. Learning Design offers the possibility of capturing the process, activities, user organization and resources used in a learning experience. But a wider set of scenarios a...
Luis de la Fuente Valentín, Yongwu Miao, Ab...