Sciweavers

9595 search results - page 1834 / 1919
» Functional programming in C
Sort
View
FC
2004
Springer
112views Cryptology» more  FC 2004»
15 years 8 months ago
The Vector-Ballot e-Voting Approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic design paradigms (or approaches): (a) Mix-Networks based, (b) Homomorphic Encryption base...
Aggelos Kiayias, Moti Yung
145
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
Toward a standard ubiquitous computing framework
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows...
Martin Modahl, Bikash Agarwalla, Gregory D. Abowd,...
123
Voted
SWAT
2004
Springer
103views Algorithms» more  SWAT 2004»
15 years 7 months ago
Maximizing the Area of Overlap of Two Unions of Disks Under Rigid Motion
Let A and B be two sets of n resp. m disjoint unit disks in the plane, with m ≥ n. We consider the problem of finding a translation or rigid motion of A that maximizes the tota...
Mark de Berg, Sergio Cabello, Panos Giannopoulos, ...
XPU
2004
Springer
15 years 7 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols
HICSS
2003
IEEE
96views Biometrics» more  HICSS 2003»
15 years 7 months ago
On the e-Negotiation of Unmatched Logrolling Views
An e-Negotiation process comprises computerfacilitated tasks, each of which aims at resolving an issue or a collection of co-related issues under negotiation. It involves an itera...
Shing-Chi Cheung, Patrick C. K. Hung, Dickson K. W...
« Prev « First page 1834 / 1919 Last » Next »