Sciweavers

5898 search results - page 977 / 1180
» Parallel Computing Environments and Methods
Sort
View
155
Voted
ASP
2005
Springer
15 years 9 months ago
Combining Answer Sets of Nonmonotonic Logic Programs
This paper studies compositional semantics of nonmonotonic logic programs. We suppose the answer set semantics of extended disjunctive programs and consider the following problem. ...
Chiaki Sakama, Katsumi Inoue
EUC
2005
Springer
15 years 9 months ago
Application-Driven Customization of an Embedded Java Virtual Machine
Abstract. Java for embedded devices is today synonym of “embeddable pseudo-Java”. Embedded flavors of Java introduce incompatibilities against the standard edition and break i...
Alexandre Courbot, Gilles Grimaud, Jean-Jacques Va...
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 9 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
EUC
2004
Springer
15 years 8 months ago
Experimental Assessment of Scenario-Based Multithreading for Real-Time Object-Oriented Models: A Case Study with PBX Systems
This paper presents an experimental evaluation of our scenario-based multithreading for real-time object-oriented models by the use of a case study of a Private Branch eXchange (PB...
Saehwa Kim, Michael Buettner, Mark Hermeling, Seon...
99
Voted
KES
2004
Springer
15 years 8 months ago
Video Contents Acquisition and Editing for Conversation Scene
This paper introduces a novel method for capturing conversation scenes and editing of the obtained videos. This system aims to acquire high-quality videos and to utilize them for m...
Takashi Nishizaki, Ryo Ogata, Yuichi Nakamura, Yui...