Sciweavers

943 search results - page 156 / 189
» Interactive Design Using the Example of a Complex Medical Ap...
Sort
View
CISC
2007
Springer
108views Cryptology» more  CISC 2007»
13 years 12 months ago
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where e...
Christophe Tartary, Josef Pieprzyk, Huaxiong Wang
ICWN
2007
13 years 9 months ago
Comparing Agent Paradigms for Resource Management in Sensor Networks
— Management of power and other resources that effect field life is an important consideration in sensor networks. This paper presents and compares alternative agent paradigms ap...
Anish Anthony, Thomas C. Jannett
TSE
2010
102views more  TSE 2010»
13 years 2 months ago
Understanding Exception Handling: Viewpoints of Novices and Experts
Several recent studies indicate that many industrial applications exhibit poor quality in the design of exception-handling. To improve the quality of error-handling, we need to und...
Hina Shah, Carsten Görg, Mary Jean Harrold
PADL
2012
Springer
12 years 3 months ago
Typing the Numeric Tower
In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically...
Vincent St-Amour, Sam Tobin-Hochstadt, Matthew Fla...
ASPLOS
2006
ACM
14 years 2 months ago
Introspective 3D chips
While the number of transistors on a chip increases exponentially over time, the productivity that can be realized from these systems has not kept pace. To deal with the complexit...
Shashidhar Mysore, Banit Agrawal, Navin Srivastava...