Sciweavers

6829 search results - page 1288 / 1366
» Quantitative Generalizations of Languages
Sort
View
IFIP
2009
Springer
15 years 10 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
IWMM
2009
Springer
152views Hardware» more  IWMM 2009»
15 years 10 months ago
A new approach to parallelising tracing algorithms
Tracing algorithms visit reachable nodes in a graph and are central to activities such as garbage collection, marshalling etc. Traditional sequential algorithms use a worklist, re...
Cosmin E. Oancea, Alan Mycroft, Stephen M. Watt
MHCI
2009
Springer
15 years 10 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
137
Voted
SEMWEB
2009
Springer
15 years 10 months ago
What Four Million Mappings Can Tell You about Two Hundred Ontologies
The field of biomedicine has embraced the Semantic Web probably more than any other field. As a result, there is a large number of biomedical ontologies covering overlapping area...
Amir Ghazvinian, Natalya Fridman Noy, Clement Jonq...
137
Voted
INDIASE
2009
ACM
15 years 10 months ago
Instant multi-tier web applications without tears
We describe how development productivity for multi-tier webbased database ‘forms’ oriented applications can be significantly improved using ‘InstantApps’, an interpretive ...
Gautam Shroff, Puneet Agarwal, Premkumar T. Devanb...
« Prev « First page 1288 / 1366 Last » Next »