Sciweavers

1855 search results - page 153 / 371
» System Consequence
Sort
View
ICWE
2005
Springer
15 years 9 months ago
MDA Transformations Applied to Web Application Development
Current Web generation techniques are mainly hard-coded for predefined architectures of Web applications. Consequently, there is a gap between Web design models and the final imple...
Santiago Meliá, Andreas Kraus, Nora Koch
ISRR
2005
Springer
211views Robotics» more  ISRR 2005»
15 years 9 months ago
Field D*: An Interpolation-Based Path Planner and Replanner
Abstract. We present an interpolation-based planning and replanning algorithm for generating smooth paths through non-uniform cost grids. Most grid-based path planners use discrete...
Dave Ferguson, Anthony Stentz
PKC
2005
Springer
156views Cryptology» more  PKC 2005»
15 years 9 months ago
Cryptanalysis of HFEv and Internal Perturbation of HFE
Hidden field equation (HFE) multivariable cryptosystems were first suggested by Patarin. Kipnis and Shamir showed that to make the cryptosystem secure, a special parameter D of a...
Jintai Ding, Dieter Schmidt
RULEML
2005
Springer
15 years 9 months ago
Nested Rules in Defeasible Logic
Defeasible Logic is a rule-based non-monotonic logic with tractable reasoning services. In this paper we extend Defeasible Logic with nested rules. We consider a new Defeasible Log...
Insu Song, Guido Governatori
ACMDIS
2004
ACM
15 years 9 months ago
Communication functions and the adaptation of design representations in interdisciplinary teams
Design representations in user-centered design serve intentions for directing design process and communication functions for enlisting interdisciplinary participation. To disentan...
David G. Hendry