Sciweavers

1490 search results - page 287 / 298
» The Logic of Authentication Protocols
Sort
View
AAI
2005
113views more  AAI 2005»
13 years 7 months ago
Analysis and Synthesis of Learning Agent's Communicative Behavior
This paper is about people. It is about understanding how learning and communication mutually influence one another; allowing people to infer each other's communicative behavi...
Nik Nailah Binti Abdullah, Stefano A. Cerri
JUCS
2007
95views more  JUCS 2007»
13 years 7 months ago
A First Step Mapping IMS Learning Design and Moodle
: Mapping the specification IMS Learning Design and the Course Management System Moodle is a logical step forward on interoperability between eLearning systems and specifications i...
Daniel Burgos, Colin Tattersall, Martin Dougiamas,...
CN
1998
100views more  CN 1998»
13 years 7 months ago
Metabroker: A Generic Broker for Electronic Commerce
In traditional commerce, brokers act as middlemen between customers and providers, aggregating, repackaging and adding value to products, services or information. In the broadest ...
Steve J. Caughey, David B. Ingham, Paul Watson
CN
1999
98views more  CN 1999»
13 years 7 months ago
Mobility information for resource management in wireless ATM networks
ZUser mobility poses a significant technical challenge to network resource management in wireless ATM Asynchronous . Z .Transfer Mode networks. In order to guarantee quality of se...
Xuemin Shen, Jon W. Mark
JSC
2010
100views more  JSC 2010»
13 years 2 months ago
An invariant-based approach to the verification of asynchronous parameterized networks
A uniform verification problem for parameterized systems is to determine whether a temporal property is satisfied for every instance of the system which is composed of an arbitrar...
Igor V. Konnov, Vladimir A. Zakharov