Sciweavers

2028 search results - page 399 / 406
» Deriving Relation Keys from XML Keys
Sort
View
136
Voted
DC
2007
15 years 3 months ago
On private computation in incomplete networks
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
Amos Beimel
137
Voted
JUCS
2008
120views more  JUCS 2008»
15 years 3 months ago
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
: In communication systems that guarantee seamless mobility of users across service areas, repeated attempts occur as a result of user behavior but also as automatic retries of blo...
José Manuel Giménez-Guzmán, M...
144
Voted
MCS
2008
Springer
15 years 3 months ago
Error analysis of a stochastic immersed boundary method incorporating thermal fluctuations
A stochastic numerical scheme for an extended immersed boundary method which incorporates thermal fluctuations for the simulation of microscopic biological systems consisting of fl...
Paul J. Atzberger, Peter R. Kramer
144
Voted
JUCS
2006
135views more  JUCS 2006»
15 years 3 months ago
Operational/Interpretive Unfolding of Multi-adjoint Logic Programs
Abstract: Multi-adjoint logic programming represents a very recent, extremely flexible attempt for introducing fuzzy logic into logic programming. In this setting, the execution of...
Pascual Julián, Ginés Moreno, Jaime ...
151
Voted
MTA
2008
186views more  MTA 2008»
15 years 3 months ago
Tactile web browsing for blind people
Information on the World Wide Web becomes more and more important for our society. For blind people this is a chance to access more information for their everyday life. In this pap...
Martin Rotard, Christiane Taras, Thomas Ertl