Sciweavers

5401 search results - page 166 / 1081
» Using Versions in GIS
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 7 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
TON
1998
87views more  TON 1998»
15 years 3 months ago
Adaptive hybrid clock discipline algorithm for the network time protocol
This paper describes the analysis, implementation and performance of a new algorithm engineered to discipline a computer clock to a source of standard time, such as a GPS receiver...
David L. Mills
TSE
2011
165views more  TSE 2011»
14 years 11 months ago
Bristlecone: Language Support for Robust Software Applications
— We present Bristlecone, a programming language for robust software systems. Bristlecone applications have two components: a high-level organization specification that describe...
Brian Demsky, Sivaji Sundaramurthy
CHI
2005
ACM
16 years 4 months ago
Multiple virtual rafts: a multi-user paradigm for interacting with communities of autonomous characters
This paper describes a multi-user version of the "Virtual Raft Project" being exhibited in the Interactivity Program at CHI 2005. The Virtual Raft Project is an interact...
Bill Tomlinson, Jesse Gray, Man Lok Yau
WOLLIC
2009
Springer
15 years 10 months ago
: An Action-Based Logic for Reasoning about Contracts
Abstract. This paper presents a new version of the CL contract specification language. CL combines deontic logic with propositional dynamic logic but it applies the modalities exc...
Cristian Prisacariu, Gerardo Schneider