Sciweavers

6168 search results - page 1154 / 1234
» Research methods for HCI
Sort
View
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 5 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
ICFCA
2004
Springer
15 years 5 months ago
Automated Lattice Drawing
Lattice diagrams, known as Hasse diagrams, have played an ever increasing role in lattice theory and fields that use lattices as a tool. Initially regarded with suspicion, they no...
Ralph Freese
IFM
2004
Springer
175views Formal Methods» more  IFM 2004»
15 years 5 months ago
State/Event-Based Software Model Checking
Abstract. We present a framework for model checking concurrent software systems which incorporates both states and events. Contrary to other state/event approaches, our work also i...
Sagar Chaki, Edmund M. Clarke, Joël Ouaknine,...
KI
2004
Springer
15 years 5 months ago
SmartWeb: Mobile Applications of the Semantic Web
Abstract Recent progress in mobile broadband communication and semantic web technology is enabling innovative internet services that provide advanced personalization and localizati...
Wolfgang Wahlster
OTM
2004
Springer
15 years 5 months ago
A Virtual-Machine-Based Middleware
Currently, a number of distributed software systems development tools exist, but typically they are designed either to satisfy industrial standards – industrial perspective – o...
Alcides Calsavara, Agnaldo K. Noda, Juarez da Cost...
« Prev « First page 1154 / 1234 Last » Next »