Sciweavers

592 search results - page 94 / 119
» Competition, Cooperation, and Authorization
Sort
View
CORR
2010
Springer
75views Education» more  CORR 2010»
13 years 8 months ago
Optimal control theory : a method for the design of wind instruments
It has been asserted previously by the author that optimal control theory can be a valuable framework for theoretical studies about the shape that a wind instrument should have in...
Georges Le Vey
ISCI
2008
86views more  ISCI 2008»
13 years 8 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
CORR
2007
Springer
85views Education» more  CORR 2007»
13 years 8 months ago
Interface groups and financial transfer architectures
Analytic execution architectures have been proposed by the same authors as a means to conceptualize the cooperation between heterogeneous collectives of components such as program...
Jan A. Bergstra, Alban Ponse
CACM
1998
106views more  CACM 1998»
13 years 8 months ago
Sorting Out Searching: A User-Interface Framework for Text Searches
: Current user interfaces for textual database searching leave much to be desired: individually, they are often confusing, and as a group, they are seriously inconsistent. We propo...
Ben Shneiderman, Donald Byrd, W. Bruce Croft
IAJIT
2010
133views more  IAJIT 2010»
13 years 7 months ago
Improving web services security models
: Web services are considered one of the main technologies which emerged in recent years, they provide an application integration technology that allows business applications to co...
Sawsan Abu-Taleb, Hossam Mustafa