Sciweavers

1554 search results - page 237 / 311
» cases 2003
Sort
View
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
CSL
2003
Springer
15 years 3 months ago
Generating All Abductive Explanations for Queries on Propositional Horn Theories
Abstract. Abduction is a fundamental mode of reasoning, which has taken on increasing importance in Artificial Intelligence (AI) and related disciplines. Computing abductive expla...
Thomas Eiter, Kazuhisa Makino
DEXA
2003
Springer
130views Database» more  DEXA 2003»
15 years 3 months ago
Finding Neighbor Communities in the Web Using Inter-site Graph
In recent years, link-based information retrieval methods from the Web are developed. A framework of these methods is a Web graph using pages as vertices and Web-links as edges. In...
Yasuhito Asano, Hiroshi Imai, Masashi Toyoda, Masa...
DSOM
2003
Springer
15 years 3 months ago
Automating Enterprise Application Placement in Resource Utilities
Abstract. Enterprise applications implement business resource management systems, customer relationship management systems, and general systems for commerce. These applications rel...
Jerry Rolia, Artur Andrzejak, Martin F. Arlitt
DSVIS
2003
Springer
15 years 3 months ago
Bridging the Gap: Developing 2D and 3D User Interfaces with the IDEAS Methodology
Most user interface development methodologies have been conceived based on the experience from the development of traditional PC-based systems. However, computer and displays techn...
José Pascual Molina, Pascual Gonzále...