Sciweavers

1050 search results - page 177 / 210
» Towards programming for the non-technical
Sort
View
CCS
2003
ACM
14 years 24 days ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
CP
2003
Springer
14 years 24 days ago
CP-IP Techniques for the Bid Evaluation in Combinatorial Auctions
Abstract. Combinatorial auctions are an important e-commerce application where bidders can bid on combinations of items. The problem of selecting the best bids that cover all items...
Alessio Guerri, Michela Milano
IFIP
2003
Springer
14 years 23 days ago
A Rotational Sector-Based, Receiver-Oriented Mechanism for Location Tracking and Medium Access Control in Ad Hoc Networks Using
The use of directional antenna in wireless ad hoc networks potentially increases simultaneous communication by directing the transmitting and receiving beams towards the receiver a...
Tetsuro Ueda, Shinsuke Tanaka, Dola Saha, Siuli Ro...
UM
2010
Springer
14 years 19 days ago
PersonisJ: Mobile, Client-Side User Modelling
The increasing trend towards powerful mobile phones opens many possibilities for valuable personalised services to be available on the phone. Client-side personalisation for these ...
Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfel...
CLUSTER
2009
IEEE
14 years 8 days ago
A scalable and generic task scheduling system for communication libraries
Abstract—Since the advent of multi-core processors, the physionomy of typical clusters has dramatically evolved. This new massively multi-core era is a major change in architectu...
François Trahay, Alexandre Denis