Sciweavers

3379 search results - page 321 / 676
» Powers of Two
Sort
View
ENTCS
2008
105views more  ENTCS 2008»
15 years 4 months ago
Checking Equivalence for Reo Networks
Constraint automata have been used as an operational model for component connectors described in the coordination language Reo which specifies the cooperation and communication of...
Tobias Blechmann, Christel Baier
COGSCI
2006
107views more  COGSCI 2006»
15 years 4 months ago
Arrows in Comprehending and Producing Mechanical Diagrams
Mechanical systems have structural organizations--parts, and their relations--and functional organizations--temporal, dynamic, and causal processes--which can be explained using t...
Julie Heiser, Barbara Tversky
EOR
2006
113views more  EOR 2006»
15 years 4 months ago
Validation of regression metamodels in simulation: Bootstrap approach
Simulation experiments are often analyzed through a linear regression model of their input/output data. Such an analysis yields a metamodel or response surface for the underlying ...
Jack P. C. Kleijnen, David Deflandre
IJNSEC
2008
119views more  IJNSEC 2008»
15 years 4 months ago
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Inspired by an old Chinese game, Go, we have designed a new graphical password scheme, Pass-Go, in which a user selects intersections on a grid as a way to input a password. While...
Hai Tao, Carlisle Adams
141
Voted
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 4 months ago
Improvement on Nominative Proxy Signature Schemes
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In...
Zuo-Wen Tan