Sciweavers

14704 search results - page 2698 / 2941
» computing 2007
Sort
View
161
Voted
IANDC
2007
151views more  IANDC 2007»
15 years 4 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
130
Voted
IDT
2007
83views more  IDT 2007»
15 years 4 months ago
Negotiating flexible agreements by combining distributive and integrative negotiation
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
Quoc Bao Vo, Lin Padgham, Lawrence Cavedon
IDT
2007
96views more  IDT 2007»
15 years 4 months ago
Fuzzy cognitive network: A general framework
In this paper, we present a general computational and operational framework for the Fuzzy Cognitive Network (FCN), which is a direct extension of Fuzzy Cognitive Maps (FCM). The pr...
Theodoros L. Kottas, Yiannis S. Boutalis, Manolis ...
IEICET
2007
110views more  IEICET 2007»
15 years 4 months ago
A Higher-Order Knuth-Bendix Procedure and Its Applications
The completeness (i.e. confluent and terminating) property is an important concept when using a term rewriting system (TRS) as a computational model of functional programming lang...
Keiichirou Kusakari, Yuki Chiba
IIE
2007
130views more  IIE 2007»
15 years 4 months ago
An Iterative Methodology for Teaching Object Oriented Concepts
Abstract thinking is a vital skill when learning computer science. Object technology and the concepts it is based upon make this skill even more crucial. However, previous research...
Irit Hadar, Ethan Hadar
« Prev « First page 2698 / 2941 Last » Next »