Sciweavers

867 search results - page 149 / 174
» A Model for Dynamic Shape and Its Applications
Sort
View
155
Voted
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 9 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
DAIS
2003
15 years 5 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
111
Voted
WCE
2007
15 years 4 months ago
Exploring the Interdependencies among Communication, Knowledgeability and Performance of Multi-agent Systems
— The advent of ubiquitous computing has revolutionized distributed Multi-agent systems (MAS). Consequently, there are many software projects focusing on MASs. However, its succe...
Punam Bedi, Vibha Gaur
125
Voted
AC
2006
Springer
15 years 3 months ago
Web Testing for Reliability Improvement
In this chapter, we characterize problems for web applications, examine existing testing techniques that are potentially applicable to the web environment, and introduce a strateg...
Jeff Tian, Li Ma
117
Voted
NN
2006
Springer
15 years 3 months ago
Propagation and control of stochastic signals through universal learning networks
The way of propagating and control of stochastic signals through Universal Learning Networks (ULNs) and its applications are proposed. ULNs have been already developed to form a s...
Kotaro Hirasawa, Shingo Mabu, Jinglu Hu