Sciweavers

397 search results - page 48 / 80
» Lifting of divisible designs
Sort
View
WSC
2007
13 years 11 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
IJCAI
2007
13 years 10 months ago
RoxyBot-06: An (SAA)2 TAC Travel Agent
In this paper, we describe our entrant in the travel division of the 2006 Trading Agent Competition (TAC). At a high level, the design of many successful autonomous trading agents...
Seong Jae Lee, Amy R. Greenwald, Victor Naroditski...
ECIS
2003
13 years 10 months ago
Application of the theory of organized activity to the coordination of social information systems
Co-ordination is seen as a fundamental aspect of organisational activity where computers can help. This is motivated by the need to reconcile the conflicts that arise from the div...
José A. Moinhos Cordeiro, Joaquim Filipe
WSC
2004
13 years 10 months ago
Simulating Availability Outlook for E-Commerce Business of Personal Computer Sales
For newly designed or transformed business processes, accurately predicting business performances such as costs and customer services before actual deployment is very important. W...
Young M. Lee
COMCOM
2006
115views more  COMCOM 2006»
13 years 9 months ago
Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance
There exists a high demand for reliable, high capacity underwater acoustic networks to allow efficient data gathering and information exchange. This is evidenced by significant re...
Mihaela Cardei