Sciweavers

859 search results - page 142 / 172
» The Changing Face of Cryptography
Sort
View
ISR
2007
14 years 9 months ago
Product Development and Pricing Strategy for Information Goods Under Heterogeneous Outside Opportunities
This paper considers a two-stage development problem for information goods with costless quality degradation. In our model, a seller of information goods faces customers that are ...
Ying-Ju Chen, Sridhar Seshadri
JLP
2007
159views more  JLP 2007»
14 years 9 months ago
Reasoning about interaction protocols for customizing web service selection and composition
This work faces the problem of web service selection and composition, discussing the advantages that derive from the inclusion, in a web service declarative description, of the hi...
Matteo Baldoni, Cristina Baroglio, Alberto Martell...
ADHOC
2007
134views more  ADHOC 2007»
14 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
CLUSTER
2002
IEEE
14 years 9 months ago
Open Metadata Formats: Efficient XML-Based Communication for High Performance Computing
High-performance computing faces considerable change as the Internet and the Grid mature. Applications that once were tightly-coupled and monolithic are now decentralized, with co...
Patrick Widener, Greg Eisenhauer, Karsten Schwan, ...
CGF
2002
162views more  CGF 2002»
14 years 9 months ago
Geometric Snakes for Triangular Meshes
Feature detection is important in various mesh processing techniques, such as mesh editing, mesh morphing, mesh compression, and mesh signal processing. In spite of much research ...
Yunjin Lee, Seungyong Lee