Sciweavers

17505 search results - page 3409 / 3501
» Use Cases as Workflows
Sort
View
166
Voted
ECLIPSE
2005
ACM
15 years 6 months ago
Leveraging Eclipse for integrated model-based engineering of web service compositions
In this paper we detail the design and implementation of an Eclipse plug-in for an integrated, model-based approach, to the engineering of web service compositions. The plug-in al...
Howard Foster, Sebastián Uchitel, Jeff Mage...
CRYPTO
2008
Springer
92views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Compression from Collisions, or Why CRHF Combiners Have a Long Output
A black-box combiner for collision resistant hash functions (CRHF) is a construction which given black-box access to two hash functions is collision resistant if at least one of th...
Krzysztof Pietrzak
DALT
2008
Springer
15 years 6 months ago
Abstracting and Verifying Strategy-Proofness for Auction Mechanisms
ing and Verifying Strategy-proofness for Auction Mechanisms E. M. Tadjouddine, F. Guerin, and W. Vasconcelos Department of Computing Science, King's College, University of Abe...
Emmanuel M. Tadjouddine, Frank Guerin, Wamberto We...
143
Voted
EKAW
2008
Springer
15 years 6 months ago
An Analysis of the Origin of Ontology Mismatches on the Semantic Web
Despite the potential of domain ontologies to provide consensual representations of domain-relevant knowledge, the open, distributed and decentralized nature of the Semantic Web me...
Paul R. Smart, Paula C. Engelbrecht
115
Voted
ESA
2008
Springer
96views Algorithms» more  ESA 2008»
15 years 6 months ago
Stabbing Convex Polygons with a Segment or a Polygon
Let O = {O1, . . . , Om} be a set of m convex polygons in R2 with a total of n vertices, and let B be another convex k-gon. A placement of B, any congruent copy of B (without refle...
Pankaj K. Agarwal, Danny Z. Chen, Shashidhara K. G...
« Prev « First page 3409 / 3501 Last » Next »