Sciweavers

1172 search results - page 159 / 235
» Who killed design
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
On Modeling VoIP Traffic in Broadband Networks
With the general trend towards ubiquitous access to the Internet, more users will prefer to make voice calls through the Internet. VoIP as the application which facilitates voice c...
Ehsan Haghani, Swades De, Nirwan Ansari
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
14 years 1 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
CSMR
2004
IEEE
14 years 1 months ago
Empirical Investigation of a Non-Intrusive Approach to Study Comprehension Cognitive Models
Usually software is maintained by people different from those who developed it. In this context the maintenance activities are dominated by the comprehension effort. The study of ...
Marco Torchiano
DAS
2006
Springer
14 years 1 months ago
Exploratory Analysis System for Semi-structured Engineering Logs
Engineering diagnosis often involves analyzing complex records of system states printed to large, textual log files. Typically the logs are designed to accommodate the widest debug...
Michael Flaster, Bruce Hillyer, Tin Kam Ho
EKAW
2006
Springer
14 years 1 months ago
SemSearch: A Search Engine for the Semantic Web
Semantic search promises to produce precise answers to user queries by taking advantage of the availability of explicit semantics of information in the context of the semantic web....
Yuangui Lei, Victoria S. Uren, Enrico Motta