Sciweavers

289 search results - page 21 / 58
» Provenance: a future history
Sort
View
ACSW
2003
13 years 11 months ago
Provably Secure Key Exchange: An Engineering Approach
We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficie...
Yiu Shing Terry Tin, Colin Boyd, Juanma Gonz&aacut...
ACL
1998
13 years 11 months ago
A Preliminary Model of Centering in Dialog
The centering framework explains local coherence by relating local focus and the form of referring expressions. It has proven useful in monolog, but its utility for multiparty dis...
Donna K. Byron, Amanda Stent
TOPNOC
2010
13 years 4 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
MOBIHOC
2009
ACM
14 years 10 months ago
Predict and relay: an efficient routing in disruption-tolerant networks
Routing is one of the most challenging open problems in disruption-tolerant networks (DTNs) because of the shortlived wireless connectivity environment. To deal with this issue, r...
Quan Yuan, Ionut Cardei, Jie Wu
AUIC
2002
IEEE
14 years 2 months ago
Evolving the Browser Towards a Standard User Interface Architecture
If current trends continue, it is likely that the web browser will become the only widely used user interface. Web applications will become the predominant software. Should this h...
Michael J. Rees