Sciweavers

1053 search results - page 24 / 211
» On k-Path Covers and their applications
Sort
View
TOC
2008
122views more  TOC 2008»
13 years 8 months ago
Derandomizing the Ahlswede-Winter matrix-valued Chernoff bound using pessimistic estimators, and applications
: Ahlswede and Winter [IEEE Trans. Inf. Th. 2002] introduced a Chernoff bound for matrix-valued random variables, which is a non-trivial generalization of the usual Chernoff bound ...
Avi Wigderson, David Xiao
ICWE
2004
Springer
14 years 2 months ago
Using Web Services to Build Context-Aware Applications in Ubiquitous Computing
Ubiquitous and mobile web applications are typically very autonomous in nature, because they rely on additional information about the user’s context. In this paper we present a g...
Gerhard Austaller, Jussi Kangasharju, Max Müh...
EUROPKI
2004
Springer
14 years 2 months ago
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Tobias Straub, Harald Baier
AGP
2010
IEEE
13 years 9 months ago
25 Years of Applications of Logic Programming in Italy
In this paper we give a summary of our recent survey of practical applications of Logic Programming in Italy. The survey covers a 25 year time-span. Information was mainly gathere...
Alessandro Dal Palù, Paolo Torroni
EDOC
2002
IEEE
14 years 1 months ago
Automated Management of Inter-Organisational Applications
Inter-organisational applications require improved support from middleware services. This paper analyses the management requirements of multidomain applications, covering both tec...
Lea Kutvonen