Sciweavers

647 search results - page 79 / 130
» Technical method of Zoetmorerope
Sort
View
COMCOM
2007
83views more  COMCOM 2007»
13 years 10 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
ESOP
1999
Springer
14 years 2 months ago
Set-Based Failure Analysis for Logic Programs and Concurrent Constraint Programs
This paper presents the rst approximation method of the nite-failure set of a logic program by set-based analysis. In a dual view, the method yields a type analysis for programs wi...
Andreas Podelski, Witold Charatonik, Martin Mü...
WSC
2008
14 years 9 days ago
A simplified modeling approach for human system interaction
Despite increasing dependency on technology, the importance of humans is expected to increase and to provide a realistic basis for decision support; both technical and organizatio...
Torbjorn P. E. Ilar
WEBNET
2000
13 years 11 months ago
Developing Web Browser Recording Tools Using Server-Side Programming Technology
: It is always a challenge to present Web applications at a facility with no Internet connection. Traditional presentation methods such as transparencies or slides are inadequate f...
Chris J. Lu, Anantha Bangalore, Tony Tse
ERCIMDL
2010
Springer
151views Education» more  ERCIMDL 2010»
13 years 11 months ago
DiLiA - The Digital Library Assistant
In this paper we present the digital library assistant (DiLiA). The system aims at augmenting the search in digital libraries in several dimensions. In the project advanced informa...
Kathrin Eichler, Holmer Hemsen, Günter Neuman...