Sciweavers

173 search results - page 28 / 35
» Computation reuse for rigid-body dynamics
Sort
View
TCS
2010
13 years 6 months ago
Contract-based discovery of Web services modulo simple orchestrators
Web services are distributed processes with a public description of their behavior, or contract. The availability of repositories of Web service descriptions enables interesting f...
Luca Padovani
ACMSE
2009
ACM
13 years 5 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
MOBIHOC
2010
ACM
13 years 5 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng
PERCOM
2006
ACM
14 years 7 months ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 1 months ago
Video Database Modeling and Temporal Pattern Retrieval using Hierarchical Markov Model Mediator
The dream of pervasive multimedia retrieval and reuse will not be realized without incorporating semantics in the multimedia database. As video data is penetrating many informatio...
Na Zhao, Shu-Ching Chen, Mei-Ling Shyu