Sciweavers

134 search results - page 13 / 27
» Open Problems from CCCG 2006
Sort
View
WETICE
2006
IEEE
14 years 1 months ago
Handling Exceptional Conditions in Mobile Collaborative Applications: An Exploratory Case Study
The incorporation of exception handling strategies in mobile collaborative applications bring several challenges to middleware designers due to their intrinsic characteristics of ...
Nélio Cacho, Karla Damasceno, Alessandro Ga...
COMBINATORICS
2006
124views more  COMBINATORICS 2006»
13 years 7 months ago
Bounded-Degree Graphs have Arbitrarily Large Geometric Thickness
Abstract. The geometric thickness of a graph G is the minimum integer k such that there is a straight line drawing of G with its edge set partitioned into k plane subgraphs. Eppste...
János Barát, Jirí Matousek, D...
JCM
2006
169views more  JCM 2006»
13 years 7 months ago
Trends in Middleware for Mobile Ad Hoc Networks
The use of middleware has extended from simply facilitating applications' communication to a broad set of services supporting a huge spectrum of networked and distributed comp...
Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
ICRA
2006
IEEE
225views Robotics» more  ICRA 2006»
14 years 1 months ago
Constraint Optimization Coordination Architecture for Search and Rescue Robotics
— The dangerous and time sensitive nature of a disaster area makes it an ideal application for robotic exploration. Our long term goal is to enable humans, software agents, and a...
Mary Koes, Illah R. Nourbakhsh, Katia P. Sycara
ACISP
2006
Springer
13 years 11 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt