Sciweavers

12568 search results - page 2328 / 2514
» Selective user interaction
Sort
View
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 4 months ago
Network Coding over a Noisy Relay : a Belief Propagation Approach
Abstract— In recent years, network coding has been investigated as a method to obtain improvements in wireless networks. A typical assumption of previous work is that relay nodes...
Sichao Yang, Ralf Koetter
IJWET
2006
163views more  IJWET 2006»
15 years 4 months ago
A CASE tool for modelling and automatically generating web service-enabled applications
: This paper presents a CASE tool for the high-level specification of web applications integrated with web services. The CASE tool is based on WebML, a conceptual modelling languag...
Marco Brambilla, Stefano Ceri, Sara Comai, Piero F...
JCS
2008
88views more  JCS 2008»
15 years 4 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
CORR
2007
Springer
109views Education» more  CORR 2007»
15 years 4 months ago
PhantomOS: A Next Generation Grid Operating System
Grid Computing has made substantial advances in the past decade; these are primarily due to the adoption of standardized Grid middleware. However Grid computing has not yet become...
Irfan Habib, Kamran Soomro, Ashiq Anjum, Richard M...
JIIS
2008
104views more  JIIS 2008»
15 years 4 months ago
A framework for checking proofs naturally
We propose a natural framework, called NF, which supports development of formal proofs on a computer. NF is based on a theory of Judgments and Derivations. NF is designed by observ...
Masahiko Sato
« Prev « First page 2328 / 2514 Last » Next »