Sciweavers

1791 search results - page 172 / 359
» Two Types of Multiple-Conclusion Systems
Sort
View
ATAL
2003
Springer
14 years 2 months ago
On optimal outcomes of negotiations over resources
We analyse scenarios in which self-interested agents negotiate with each other in order to agree on deals to exchange resources. We consider two variants of the framework, one whe...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...
IFIP
2001
Springer
14 years 1 months ago
Translation, Betrayal and Ambiguity in IS Development
This paper uses semiotic theories to model how meaning is constructed during an IS development project. Conventionally, shared meanings among all project stakeholders are regarded...
Jim Underwood
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
14 years 1 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
SSDBM
2000
IEEE
87views Database» more  SSDBM 2000»
14 years 1 months ago
A Tool for Nesting and Clustering Large Objects
In implementations of non-standard database systems, large objects are often embedded within an aggregate of different types, i.e. a tuple. For a given size and access probabilit...
Stefan Dieker, Ralf Hartmut Güting, Miguel Ro...
CGI
1999
IEEE
14 years 1 months ago
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces
Existing data embedding algorithms for polygonal meshes and their attributes can't be applied to the majority of (geometric) computer aided design (CAD) applications, for two...
Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono