Sciweavers

10625 search results - page 1863 / 2125
» Supporting delay-intolerant applications
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 5 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CP
2007
Springer
15 years 5 months ago
GAC Via Unit Propagation
In this paper we argue that an attractive and potentially very general way of achieving generalized arc consistency (GAC) on a constraint is by using unit propagation (UP) over a C...
Fahiem Bacchus
ECML
2007
Springer
15 years 5 months ago
Generalization-Based Similarity for Conceptual Clustering
The availability of techniques for comparing descriptions has many applications in Artificial Intelligence, ranging from description selection to flexible matching, from instance...
Stefano Ferilli, Teresa Maria Altomare Basile, Nic...
78
Voted
ECOWS
2007
Springer
15 years 5 months ago
A Formal Framework For Building, Checking And Evolving Service Oriented Architectures
Web services are often employed to create wide distributed evolvable applications from existing components that constitute a service-based software system. ServicesOriented Archit...
Hervé Verjus, Frédéric Pourra...
ECTEL
2007
Springer
15 years 5 months ago
Knowledge Repositories for Rural Communities of Learning
Knowledge Repositories can be a potential solution in order to cover agricultural professionals' lifelong learning needs. An application area of particular interest is the one...
Argiris Tzikopoulos
« Prev « First page 1863 / 2125 Last » Next »