Sciweavers

105 search results - page 9 / 21
» VALENS: A Knowledge Based Tool to Validate and Verify an Aio...
Sort
View
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 7 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
ICWE
2003
Springer
14 years 20 days ago
A Design Toolkit for Hypermedia Applications
The development process of hypermedia applications involves a variety of users with different levels of knowledge and skills. In order to get a good communication among participa...
Susana Montero, Paloma Díaz, Ignacio Aedo
IJIT
2004
13 years 8 months ago
Formal Verification of a Multicast Protocol In Mobile Networks
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Mohammad Reza Matash Borujerdi, S. M. Mirzababaei
ECLIPSE
2004
ACM
14 years 27 days ago
Eclipse as a platform for research on interruption management in software development
Automated tools for mediating incoming interruptions are necessary in order to balance the concentration required for software development with the need to collaborate and absorb ...
Uri Dekel, Steven Ross
SEMWEB
2001
Springer
13 years 12 months ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...