Sciweavers

1818 search results - page 215 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
157
Voted
SEDE
2007
15 years 5 months ago
A framework for constraint checking involving aggregates for multiple XML databases using schematron
Many internet and enterprise applications now not only use XML (eXtensible Markup Language) as a medium for communication but also for storing their data either temporarily for an...
Albin Laga, Praveen Madiraju
122
Voted
WEBIST
2008
15 years 5 months ago
A Web-Based Version of a Trivial Game to Promote Galician Culture
We present in this paper the architecture and some implementation details of a web-based version of a Trivial game. Our implementation achieves such a high degree of interactivity ...
Miguel Rodríguez Luaces, Oscar Pedreira, &A...
161
Voted
CLIMA
2006
15 years 5 months ago
Adding Evolving Abilities to a Multi-Agent System
This paper reports on a fertile marriage between madAgents, a Java and Prolog based multi-agent platform, and EVOLP, a logic programming based language to represent and reason abou...
João Leite, Luís Soares
139
Voted
ICWS
2004
IEEE
15 years 5 months ago
Towards Intelligent Web Services for Automating Medical Service Composition
The vision of the Semantic Web is to reduce manual discovery and usage of Web resources (documents and services) and to allow software agents to automatically identify these Web r...
Yugyung Lee, Chintan Patel, Soon Ae Chun, James Ge...
132
Voted
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 5 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...