Sciweavers

1172 search results - page 160 / 235
» Who killed design
Sort
View
EUROCRYPT
2000
Springer
14 years 1 months ago
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Abstract. When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow ...
Victor Boyko, Philip D. MacKenzie, Sarvar Patel
ITS
2000
Springer
140views Multimedia» more  ITS 2000»
14 years 1 months ago
Multi-agent Negotiation to Support an Economy for Online Help and Tutoring
We are designing a computational architecture for a "learning economy" based on personal software agents who represent users in a virtual society and assist them in find...
Chhaya Mudgal, Julita Vassileva
KR
2000
Springer
14 years 1 months ago
An Environment for Merging and Testing Large Ontologies
Large-scale ontologies are becoming an essential component of many applications including standard search (such as Yahoo and Lycos), ecommerce (such as Amazon and eBay), configura...
Deborah L. McGuinness, Richard Fikes, James Rice, ...
ACMSE
1995
ACM
14 years 1 months ago
Database management for multimedia distributed collaborative writing
{ Traditional computer applications have been designed to be run by one user at a time who does some work in a single medium, such as ASCII text, and very little regard has been gi...
A. Wesley Wear, Yu Gong, Kai H. Chang
ICSE
1995
IEEE-ACM
14 years 1 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...