Sciweavers

2830 search results - page 209 / 566
» No Science without Semantics
Sort
View
ACMSE
2009
ACM
13 years 7 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
CSCW
2011
ACM
13 years 4 months ago
From ethnographic study to mixed reality: a remote collaborative troubleshooting system
In this paper we describe how we moved from ethnographic study to design and testing of a Mixed Reality (MR) system, supporting collaborative troubleshooting of office copiers and...
Jacki O'Neill, Stefania Castellani, Fréd&ea...
EMSOFT
2007
Springer
14 years 3 months ago
E-FRP with priorities
E-FRP is declarative language for programming resourcebounded, event-driven systems. The original high-level semantics of E-FRP requires that each event handler execute atomically...
Roumen Kaiabachev, Walid Taha, Angela Yun Zhu
VLDB
1992
ACM
101views Database» more  VLDB 1992»
14 years 1 months ago
Proclamation-Based Model for Cooperating Transactions
We propose a transaction model that provides a framework for transactions to cooperate without sacrificing serializability as a notion of correctness. Cooperation does not depend ...
H. V. Jagadish, Oded Shmueli
ICGA
2006
312views Optimization» more  ICGA 2006»
15 years 9 months ago
New Approximate Strategies for Playing Sum Games based on Subgame Types
In this work we investigate the potential of combining AI tree-search algorithms with the algorithms of combinatorial game theory to provide more efficient strategies for playing s...
Manal Zaky, Cherif Salama, Salma Ghoneim