Sciweavers

15888 search results - page 2938 / 3178
» Supporting human-intensive systems
Sort
View
123
Voted
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 7 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
139
Voted
EUROPAR
2006
Springer
15 years 7 months ago
SEER: Scalable Energy Efficient Relay Schemes in MANETs
In Mobile Ad Hoc Networks (MANETs), broadcasting is widely used to support many applications. Several adaptive broadcast schemes have been proposed to reduce the number of rebroadc...
Lin-Fei Sung, Cheng-Lin Wu, Yi-Kai Chiang, Shyh-In...
138
Voted
FMCAD
2006
Springer
15 years 7 months ago
An Integration of HOL and ACL2
We describe a link between the ACL2 and HOL mechanical proof assistants that enables the strengths of each system to be deployed smoothly within a single formal development. Severa...
Michael J. C. Gordon, James Reynolds, Warren A. Hu...
135
Voted
ER
2000
Springer
114views Database» more  ER 2000»
15 years 7 months ago
From Web Sites to Web Applications: New Issues for Conceptual Modeling
Abstract E-commerce, web-based booking systems, and on-line auction systems are only a few examples that demonstrate how WWW sites are evolving from hypermedia information reposito...
Luciano Baresi, Franca Garzotto, Paolo Paolini
112
Voted
ISN
1998
Springer
15 years 7 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
« Prev « First page 2938 / 3178 Last » Next »