Sciweavers

2518 search results - page 449 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
144
Voted
CCS
2008
ACM
15 years 4 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
116
Voted
KRDB
1994
78views Database» more  KRDB 1994»
15 years 4 months ago
The Problems of Data Modeling in Software Practice
This paper presents, fromthe author's perspective, the problems that occur in practice during data modelling. The author's experiences are a result of a considerable num...
Harald Huber
CONEXT
2009
ACM
15 years 3 months ago
Improving internet-wide routing protocols convergence with MRPC timers
The behavior of routing protocols during convergence is critical as it impacts end-to-end performance. Network convergence is particularly important in BGP, the current interdomai...
Anthony J. Lambert, Marc-Olivier Buob, Steve Uhlig
123
Voted
CE
2008
128views more  CE 2008»
15 years 2 months ago
Beyond threaded discussion: Representational guidance in asynchronous collaborative learning environments
Although most online learning environments are predominately text based, researchers have argued that representational support for the conceptual structure of a problem would addr...
Daniel D. Suthers, Ravi K. Vatrapu, Richard Medina...
147
Voted
JSAC
2007
133views more  JSAC 2007»
15 years 2 months ago
On broadcasting with cooperative diversity in multi-hop wireless networks
Abstract— Cooperative diversity facilitates spatio-temporal communications without requiring the deployment of physical antenna arrays. While physical layer studies on cooperativ...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...