Sciweavers

9425 search results - page 1641 / 1885
» Some Notes on Models and Modelling
Sort
View
PROVSEC
2010
Springer
15 years 1 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
SEMWEB
2010
Springer
15 years 1 months ago
Evolution of DL - Lite Knowledge Bases
Abstract. We study the problem of evolution for Knowledge Bases (KBs) expressed in Description Logics (DLs) of the DL-Lite family. DL-Lite is at the basis of OWL 2 QL, one of the t...
Diego Calvanese, Evgeny Kharlamov, Werner Nutt, Dm...
SIGSOFT
2010
ACM
15 years 1 months ago
Supporting human-intensive systems
Executing critical systems often rely on humans to make important and sometimes life-critical decisions. As such systems become more complex, the potential for human error to lead...
Lori A. Clarke, Leon J. Osterweil, George S. Avrun...
SWWS
2010
15 years 1 months ago
Improving User Query Processing Based on User Profile and Task Context
- Today there is a real challenge in accessing relevant information according to the needs and the context of the user. Recent studies have dynamically enhanced the user query with...
Ounas Asfari, Bich-Liên Doan, Yolaine Bourda...
VTC
2010
IEEE
132views Communications» more  VTC 2010»
15 years 1 months ago
Throughput Analysis of General Network Coding Nodes Based on SW-ARQ Transmission
The steady-state throughput of general network coding node is investigated, when data is transmitted in packets based on the stopand-wait automatic repeat request (SW-ARQ) error-co...
Yang Qin, Lie-Liang Yang
« Prev « First page 1641 / 1885 Last » Next »