Sciweavers

614 search results - page 89 / 123
» DE in Slovenia: Where are We
Sort
View
WETICE
2006
IEEE
14 years 2 months ago
Handling Exceptional Conditions in Mobile Collaborative Applications: An Exploratory Case Study
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
Nélio Cacho, Karla Damasceno, Alessandro Ga...
SDMW
2005
Springer
14 years 2 months ago
XML Security in the Next Generation Optical Disc Context
The Extensible Markup Language (XML) is considered as the de facto standard for information processing and exchange on the Internet and in the enterprise services domain. It is wid...
Gopakumar Nair, Ajeesh Gopalakrishnan, Sjouke Mauw...
SCN
2004
Springer
123views Communications» more  SCN 2004»
14 years 2 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
ICRA
2003
IEEE
177views Robotics» more  ICRA 2003»
14 years 2 months ago
A navigation framework for multiple mobile robots and its application at the Expo.02 exhibition
This paper presents a navigation framework which enables multiple mobile robots to attain individual goals, coordinate their actions and work safely and reliably in a highly dynam...
Kai Oliver Arras, Roland Philippsen, Nicola Tomati...
IDA
1997
Springer
14 years 1 months ago
How to Find Big-Oh in Your Data Set (and How Not to)
The empirical curve bounding problem is de ned as follows. Suppose data vectors X Y are presented such that E(Y i]) = f(X i]) where f(x) is an unknown function. The problem is to a...
Catherine C. McGeoch, Doina Precup, Paul R. Cohen