Sciweavers

2518 search results - page 434 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
AINA
2007
IEEE
15 years 9 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
SIGDOC
2005
ACM
15 years 8 months ago
Metadata based authoring for technical documentation
The creation process of technical documentation is an expensive and time-consuming task especially for complex products. To make this process more cost-efficient computerized supp...
Ingo Stock, Michael Weber, Eckhard Steinmeier
SIGGRAPH
1991
ACM
15 years 6 months ago
Coping with friction for non-penetrating rigid body simulation
Algorithms and computational complexity measures for simulating the motion of contacting bodies with friction are presented. The bodies are restricted to be perfectly rigid bodies...
David Baraff
IADIS
2003
15 years 4 months ago
Reconsidering the "Software Crisis": A Study of Hypermedia Systems Development
With the advent and growth of the Web, hypermedia information systems have propagated within and beyond organizations. Much concern has been expressed about the quality of hyperme...
Michael Lang
ECCC
2006
77views more  ECCC 2006»
15 years 3 months ago
Extractors and condensers from univariate polynomials
We give new constructions of randomness extractors and lossless condensers that are optimal to within constant factors in both the seed length and the output length. For extractor...
Venkatesan Guruswami, Christopher Umans, Salil P. ...