Sciweavers

132 search results - page 18 / 27
» An Architectural Foundation for Security Model Sharing and R...
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
DCOSS
2007
Springer
14 years 1 months ago
A Semantics-Based Middleware for Utilizing Heterogeneous Sensor Networks
With the proliferation of various kinds of sensor networks, we will see large amounts of heterogeneous data. They have different characteristics such as data content, formats, mod...
Eric Bouillet, Mark Feblowitz, Zhen Liu, Anand Ran...
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 2 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
OOPSLA
2009
Springer
14 years 1 months ago
The design of a task parallel library
The Task Parallel Library (TPL) is a library for .NET that makes it easy to take advantage of potential parallelism in a program. The library relies heavily on generics and delega...
Daan Leijen, Wolfram Schulte, Sebastian Burckhardt
ICDCS
2009
IEEE
14 years 4 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg