Sciweavers

813 search results - page 16 / 163
» desire 2010
Sort
View
FLOPS
2010
Springer
14 years 2 months ago
Automatically Generating Counterexamples to Naive Free Theorems
Disproof can be as important as proof in studying programs and programming languages. In particular, side conditions in a statement about program behavior are sometimes best unders...
Daniel Seidel, Janis Voigtländer
ICWE
2010
Springer
13 years 9 months ago
Applying Semantic Web Technology in a Mobile Setting: The Person Matcher
In a mobile setting, users use, handle and search for online information in a different way. Two features typically desired by mobile users are tailored information delivery and co...
William Van Woensel, Sven Casteleyn, Olga De Troye...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 7 months ago
An Integrated Framework for Performance Analysis and Tuning in Grid Environment
: In a heterogeneous, dynamic environment, like Grid, post-mortem analysis is of no use and data needs to be collected and analysed in real time. Novel techniques are also required...
Ajanta De Sarkar, Sarbani Roy, Sudipto Biswas, Nan...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 7 months ago
Applying Constraint Solving to the Management of Distributed Applications
Abstract. We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative langua...
Andrew McCarthy, Alan Dearle, Graham N. C. Kirby