Sciweavers

13277 search results - page 2632 / 2656
» An Approach to Clustering Abstracts
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 9 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
GIS
2002
ACM
13 years 9 months ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller
ACTA
1998
81views more  ACTA 1998»
13 years 9 months ago
Dijkstra-Scholten Predicate Calculus: Concepts and Misconceptions
The paper focusses on the logical backgrounds of the Dijkstra-Scholten program development style for correct programs. For proving the correctness of a program (i.e. the fact that...
Lex Bijlsma, Rob Nederpelt
CGA
1998
13 years 9 months ago
Principles for Information Visualization Spreadsheets
ns, with large, abstract, multidimensional data sets that are visually represented in multiple ways. We illustrate how spreadsheet techniques provide a structured, intuitive, and p...
Ed Huai-hsin Chi, John Riedl, Phillip Barry, Josep...
IJMMS
2002
108views more  IJMMS 2002»
13 years 9 months ago
Modelling multiple mind-matter interaction
Relations between mental and physical aspects of an agent can be of various types. Sensing and acting are among the more commonly modelled types. In agent modelling approaches ofte...
Catholijn M. Jonker, Jan Treur
« Prev « First page 2632 / 2656 Last » Next »