Sciweavers

5668 search results - page 1010 / 1134
» Overlaps in Requirements Engineering
Sort
View
SIAMCOMP
2011
14 years 11 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
SLOGICA
2011
14 years 11 months ago
Logics for Qualitative Inductive Generalization
The paper contains a survey of (mainly unpublished) adaptive logics of inductive generalization. These defeasible logics are precise formulations of certain methods. Some attentio...
Diderik Batens
TASE
2011
IEEE
14 years 11 months ago
WireWarping++: Robust and Flexible Surface Flattening With Length Control
— Surface flattening has numerous applications in sheet manufacturing industries, such as garment industry, shoe industry, toy industry, furniture industry and ship industry. Mo...
Yunbo Zhang, Charlie C. L. Wang
TASE
2011
IEEE
14 years 11 months ago
A Totally Decoupled Piezo-Driven XYZ Flexure Parallel Micropositioning Stage for Micro/Nanomanipulation
—This paper reports the design and development processes of a totally decoupled flexure-based XYZ parallel-kinematics micropositioning stage with piezoelectric actuation. The un...
Yangmin Li, Qingsong Xu
173
Voted
WWW
2011
ACM
14 years 11 months ago
Inverted index compression via online document routing
Modern search engines are expected to make documents searchable shortly after they appear on the ever changing Web. To satisfy this requirement, the Web is frequently crawled. Due...
Gal Lavee, Ronny Lempel, Edo Liberty, Oren Somekh
« Prev « First page 1010 / 1134 Last » Next »