Sciweavers

1540 search results - page 157 / 308
» Automotive System Design - Challenges and Potential
Sort
View
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 10 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
WDAG
2005
Springer
92views Algorithms» more  WDAG 2005»
15 years 10 months ago
Plausible Clocks with Bounded Inaccuracy
In a distributed system with N processes, time stamps of size N (such as vector clocks) are necessary to accurately track potential causality between events. Plausible clocks are a...
Brad T. Moore, Paolo A. G. Sivilotti
160
Voted
DIAGRAMS
2004
Springer
15 years 10 months ago
Cider: A Component-Based Toolkit for Creating Smart Diagram Environments
— Smart Diagram Environments (SDEs) are software applications that use structured diagrams to provide a natural visual interface that behaves as if the computer “understands”...
Anthony R. Jansen, Kim Marriott, Bernd Meyer
96
Voted
CDC
2009
IEEE
15 years 9 months ago
Interaction of service providers in task delegation under simple payment rules
— We consider a scenario where an application service provider (ASP) hires a network service provider (NSP) to deliver its service and pays for the employment of the NSP. We stud...
Richard J. La, Jeonghoon Mo
GROUP
1997
ACM
15 years 8 months ago
Bridging the gap between face-to-face communication and long-term collaboration
During the different phases of a project, stakeholders have different communication needs and make use of different communication media to satisfy them. A group memory system must...
Stefanie N. Lindstaedt, Kurt Schneider