Sciweavers

2845 search results - page 435 / 569
» Constraints over Ontologies
Sort
View
DMSN
2004
ACM
14 years 2 months ago
Adaptive sampling for sensor networks
A distributed data-stream architecture finds application in sensor networks for monitoring environment and activities. In such a network, large numbers of sensors deliver continu...
Ankur Jain, Edward Y. Chang
SACMAT
2004
ACM
14 years 2 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
EUROCRYPT
2004
Springer
14 years 2 months ago
Merkle Tree Traversal in Log Space and Time
Abstract. We present a technique for Merkle tree traversal which requires only logarithmic space and time1 . For a tree with N nodes, our algorithm computes sequential tree leaves ...
Michael Szydlo
EUROPKI
2004
Springer
14 years 2 months ago
Mobile Qualified Electronic Signatures and Certification on Demand
Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promisin...
Heiko Rossnagel
GIAE
2004
Springer
187views Mathematics» more  GIAE 2004»
14 years 2 months ago
nD Object Representation and Detection from Single 2D Line Drawing
In this paper, we propose the wireframe representation of nD object, which is a single 2D line drawing. A wireframe model of an nD object is composed of a set of edges connecting a...
Hongbo Li, Quan Wang, Lina Zhao, Ying Chen, Lei Hu...