Sciweavers

1205 search results - page 210 / 241
» The creativity support index
Sort
View
ISCI
2008
104views more  ISCI 2008»
13 years 8 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
JNW
2008
79views more  JNW 2008»
13 years 8 months ago
A Proportional Jitter Scheduling and Buffer Management Algorithm for Differentiated Services Networks
This paper proposes a method for scheduling and buffer management in differentiated services networks which is based on JoBS algorithm. JoBS differentiates traffic classes base on ...
Mohammad Hossien Yaghmaee, Ghazale Khojasteh Tousi
ER
2010
Springer
90views Database» more  ER 2010»
13 years 8 months ago
W-Ray: A Strategy to Publish Deep Web Geographic Data
Abstract. This paper introduces an approach to address the problem of accessing conventional and geographic data from the Deep Web. The approach relies on describing the relevant d...
Helena Piccinini, Melissa Lemos, Marco A. Casanova...
RE
2010
Springer
13 years 7 months ago
Assessing traceability of software engineering artifacts
Abstract The generation of traceability links or traceability matrices is vital to many software engineering activities. It is also person-power intensive, time-consuming, error-pr...
Senthil Karthikeyan Sundaram, Jane Huffman Hayes, ...
SYNTHESE
2010
54views more  SYNTHESE 2010»
13 years 7 months ago
Two contextualist fallacies
I examine the radical contextualists’ two main arguments for the semantic underdeterminacy thesis, according to which all, or almost all, English sentences lack context-independ...
Martin Montminy