Sciweavers

3481 search results - page 102 / 697
» Exploration in Relational Worlds
Sort
View
WCRE
2008
IEEE
14 years 2 months ago
A Business Process Explorer: Recovering Business Processes from Business Applications
A business process contains a set of logically related tasks executed to fulfill business goals. Business applications enable organizations to automatically perform their daily op...
Jin Guo, Ying Zou
ICDCSW
2007
IEEE
14 years 2 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
ICRA
2007
IEEE
106views Robotics» more  ICRA 2007»
14 years 2 months ago
Exploring Different Coherence Dimensions to Answer Proximity Queries for Convex Polyhedra
— Different coherence dimensions can be considered to improve the performances of an algorithm for computing collision translations of pairs of convex polyhedra. The algorithm’...
Claudio Mirolo, Stefano Carpin, Enrico Pagello
PERVASIVE
2005
Springer
14 years 1 months ago
Exploring Mobile Phone Interaction with Situated Displays
One of the most promising possibilities for supporting user interaction with public displays is the use of personal mobile phones. Furthermore, by utilising Bluetooth users should...
Keith Cheverst, Alan J. Dix, Dan Fitton, Christian...
ESAS
2004
Springer
14 years 1 months ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt