Sciweavers

35419 search results - page 170 / 7084
» How are we doing
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
PODC
1990
ACM
15 years 8 months ago
Half-Order Modal Logic: How to Prove Real-Time Properties
Abstract. We introduce a novel extension of propositional modal logic that is interpreted over Kripke structures in which a value is associated with every possible world. These val...
Thomas A. Henzinger
135
Voted
ATAL
2006
Springer
15 years 7 months ago
How equitable is rational negotiation?
Notions of fairness have recently received increased attention in the context of resource allocation problems, pushed by diverse applications where not only pure utilitarian effic...
Sylvia Estivie, Yann Chevaleyre, Ulle Endriss, Nic...
125
Voted
CORR
2004
Springer
103views Education» more  CORR 2004»
15 years 4 months ago
The Freeze-Tag Problem: How to Wake Up a Swarm of Robots
An optimization problem that naturally arises in the study of swarm robotics is the Freeze-Tag Problem (FTP) of how to awaken a set of "asleep" robots, by having an awak...
Esther M. Arkin, Michael A. Bender, Sándor ...
IJMI
2002
82views more  IJMI 2002»
15 years 3 months ago
Protein names and how to find them
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...
Kristofer Franzén, Gunnar Eriksson, Fredrik...