Sciweavers

188 search results - page 30 / 38
» Knowledge management and the limits of knowledge codificatio...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
CBSE
2008
Springer
13 years 9 months ago
Ada-CCM: Component-Based Technology for Distributed Real-Time Systems
: This paper proposes a technology for the development of distributed real-time component-based applications, which takes advantage of the features that Ada offers for the developm...
Patricia López Martínez, José...
DCOSS
2008
Springer
13 years 9 months ago
Decoding Code on a Sensor Node
Abstract. Wireless sensor networks come of age and start moving out of the laboratory into the field. As the number of deployments is increasing the need for an efficient and relia...
Pascal von Rickenbach, Roger Wattenhofer
BDA
2003
13 years 9 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
ESWS
2008
Springer
13 years 8 months ago
A Core Ontology for Business Process Analysis
Business Process Management (BPM) aims at supporting the whole life-cycle necessary to deploy and maintain business processes in organisations. An important step of the BPM life-cy...
Carlos Pedrinaci, John Domingue, Ana Karla Alves d...