Sciweavers

2421 search results - page 103 / 485
» Message from the Editor-in-Chief
Sort
View
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 3 months ago
Challenges of Adopting Web Services: Experiences from the Financial Industry
Despite the many expected benefits of Web services technology, some organizations are hesitating to adopt Web services on a larger scale and across their organizational boundaries...
Andrew P. Ciganek, Marc N. Haines, William (Dave) ...
ERCIMDL
1999
Springer
146views Education» more  ERCIMDL 1999»
14 years 2 months ago
Metadata for Photographs: From Digital Library to Multimedia Application
This paper describes the production of an educational multimedia CD-ROM about French rural houses and farms, and how to renovate them without losing their traditional features. Th...
Anne-Marie Vercoustre, François Paradis
RTCSA
1998
IEEE
14 years 2 months ago
Protocol Synthesis from Context-Free Processes Using Event Structures
In this paper, we propose a protocol synthesis method based on a partial order model (called event structures) for the class of context-free processes. First, we assign a unique n...
Akio Nakata, Teruo Higashino, Kenichi Taniguchi
CORR
2007
Springer
156views Education» more  CORR 2007»
13 years 10 months ago
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation
Abstract—Capacity improvement from transmitter and receiver cooperation is investigated in a two-transmitter, two-receiver network with phase fading and full channel state inform...
Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith,...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 10 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...