Sciweavers

CMSB
2008
Springer
13 years 10 months ago
The Attributed Pi Calculus
Mathias John, Cédric Lhoussaine, Joachim Ni...
CIS
2007
Springer
13 years 10 months ago
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment
Multi-domain application environments where distributed domains interoperate with each other are becoming a reality in Internet-based enterprise applications. The secure interoper...
Cuihua Zuo, Ruixuan Li, Hongmu Han, Zhengding Lu
CIE
2007
Springer
13 years 10 months ago
Finding Most Likely Solutions
Abstract. As one simple type of statistical inference problems we consider Most Likely Solution problem, a task of finding a most likely solution (MLS in short) for a given proble...
Osamu Watanabe, Mikael Onsjö
CIE
2007
Springer
13 years 10 months ago
Constructive Dimension and Weak Truth-Table Degrees
This paper examines the constructive Hausdorff and packing dimensions of weak truth-table degrees. The main result is that every infinite sequence S with constructive Hausdorff...
Laurent Bienvenu, David Doty, Frank Stephan
CF
2007
ACM
13 years 10 months ago
Computational and storage power optimizations for the O-GEHL branch predictor
In recent years, highly accurate branch predictors have been proposed primarily for high performance processors. Unfortunately such predictors are extremely energy consuming and i...
Kaveh Aasaraai, Amirali Baniasadi, Ehsan Atoofian
ATC
2008
Springer
13 years 10 months ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...
ATC
2007
Springer
13 years 10 months ago
A Generic and Modular System Architecture for Trustworthy, Autonomous Applications
We propose a generic architecture to facilitate the systematic design of autonomous, adaptive and safe applications. We specify generic modules including a trustworthiness enforcem...
George Brancovici, Christian Müller-Schloer
APSCC
2007
IEEE
13 years 10 months ago
Consumer-Friendly Shopping Assistance by Personal Behavior Log Analysis on Ubiquitous Shop Space
: This paper has proposed a shopping assistance service. We provide consumer-friendly services which based on personal behavior log data. The consumer-friendly services are informa...
Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogi...
BIRTHDAY
2010
Springer
13 years 10 months ago
A Parallel Algorithm for Fixed-Length Approximate String-Matching with k-mismatches
Maxime Crochemore, Costas S. Iliopoulos, Solon P. ...
ACII
2007
Springer
13 years 10 months ago
An Empathic Rational Dialog Agent
Recent research has shown that virtual agent able to express empathic emotions enhances human-machine interaction. In this paper, we present the capabilities that virtual agent sho...
Magalie Ochs, Catherine Pelachaud, David Sadek