Sciweavers

1573 search results - page 196 / 315
» Signs and Formal Concepts
Sort
View
91
Voted
MSR
2006
ACM
15 years 7 months ago
Mining eclipse for cross-cutting concerns
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
ICRA
2005
IEEE
105views Robotics» more  ICRA 2005»
15 years 7 months ago
Vision-Based Control of a Gough-Stewart Parallel Mechanism using Legs Observation
Abstract— This paper presents a novel approach for visionbased control of the end-effector of parallel mechanisms. It is based on the metrological redundancy paradigm, which simp...
Nicolas Andreff, Arnaud Marchadier, Philippe Marti...
143
Voted
CTRSA
2005
Springer
121views Cryptology» more  CTRSA 2005»
15 years 7 months ago
Time-Selective Convertible Undeniable Signatures
Undeniable signatures were introduced in 1989 by Chaum and van Antwerpen to limit the self-authenticating property of digital signatures. An extended concept – the convertible un...
Fabien Laguillaumie, Damien Vergnaud
EPIA
2005
Springer
15 years 7 months ago
Intentions and Strategies in Game-Like Scenarios
In this paper, we investigate the link between logics of games and “mentalistic” logics of rational agency, in which agents are characterized in terms of attitudes such as beli...
Wojciech Jamroga, Wiebe van der Hoek, Michael Wool...
88
Voted
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 7 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva