Sciweavers

3318 search results - page 420 / 664
» The Weak Instance Model
Sort
View
IEEECIT
2010
IEEE
15 years 2 months ago
The Research on Teaching Method of Basics Course of Computer based on Cluster Analysis
Due to the difference between rural and urban and regional disparity of computer basic education produced at their middle school period, computer application level of the freshmen ...
ZhiXin Tie, Rong Jin, Hong Zhuang, Zhaoqing Wang
IPPS
2010
IEEE
15 years 2 months ago
Improving the performance of Uintah: A large-scale adaptive meshing computational framework
Abstract--Uintah is a highly parallel and adaptive multiphysics framework created by the Center for Simulation of Accidental Fires and Explosions in Utah. Uintah, which is built up...
Justin Luitjens, Martin Berzins
PROVSEC
2010
Springer
15 years 2 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
MOC
2011
14 years 11 months ago
Convergence of a mixed method for a semi-stationary compressible Stokes system
We propose and analyze a finite element method for a semi– stationary Stokes system modeling compressible fluid flow subject to a Navier– slip boundary condition. The veloci...
Kenneth H. Karlsen, Trygve K. Karper
ISR
2010
14 years 11 months ago
Use of Pricing Schemes for Differentiating Information Goods
Information goods vendors offer different pricing schemes such as per user pricing and site licensing. Why do competing sellers adopt different pricing schemes for the same inform...
Vidyanand Choudhary