Sciweavers

ACSC
2004
IEEE
14 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
GI
2004
Springer
14 years 3 months ago
Integrating an Agile Process in a Model Driven Architecture
The model driven development is an interested area among software engineers as well as the agile development. In fact, combining model driven and agile practices is an interesting ...
Paloma Cáceres, Francisco Díaz, Espe...
FOCS
2004
IEEE
14 years 1 months ago
Edge-Disjoint Paths in Planar Graphs
We study the maximum edge-disjoint paths problem in undirected planar graphs: given a graph G and node pairs (demands) s1t1, s2t2, . . ., sktk, the goal is to maximize the number ...
Chandra Chekuri, Sanjeev Khanna, F. Bruce Shepherd
PDC
2004
ACM
14 years 3 months ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar
MFCS
2004
Springer
14 years 3 months ago
The Bidimensional Theory of Bounded-Genus Graphs
Abstract. Bidimensionality provides a tool for developing subexponential fixed-parameter algorithms for combinatorial optimization problems on graph families that exclude a minor....
Erik D. Demaine, Mohammad Taghi Hajiaghayi, Dimitr...
Theoretical Computer Science
Top of PageReset Settings