Sciweavers

2763 search results - page 516 / 553
» The Dangerous 'All' in Specifications
Sort
View
JSS
2008
93views more  JSS 2008»
13 years 10 months ago
A language for high-level description of adaptive web systems
This paper focuses on the proposal, design, and implementation of AWL, the Adaptive Web Language. Also, an example application named PENS is explained and implemented in AWL. AWL ...
S. Hossein Sadat-Mohtasham, Ali A. Ghorbani
JUCS
2008
156views more  JUCS 2008»
13 years 10 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
EJIS
2007
97views more  EJIS 2007»
13 years 10 months ago
Analyzing IS research productivity: an inclusive approach to global IS scholarship
An increasing number of studies have appeared that evaluate and rank journal quality and the productivity of IS scholars and their institutions. In this paper, we describe the res...
Michael J. Gallivan, Raquel Benbunan-Fich
JSAC
2006
157views more  JSAC 2006»
13 years 10 months ago
Traffic grooming in path, star, and tree networks: complexity, bounds, and algorithms
We consider the problem of traffic grooming in WDM path, star, and tree networks. Traffic grooming is a variant of the well-known logical topology design, and is concerned with the...
Shu Huang, Rudra Dutta, George N. Rouskas
JSAC
2006
180views more  JSAC 2006»
13 years 10 months ago
Adaptive spread-spectrum multicarrier multiple-access over wirelines
Abstract--In this paper, we investigate the dynamic resource allocation adapted to spread-spectrum multicarrier multiple-access (SS-MC-MA) systems in a multiuser power line communi...
Matthieu Crussière, Jean-Yves Baudais, Jean...