Sciweavers

1559 search results - page 272 / 312
» Cooperative Communications
Sort
View
ISADS
1999
IEEE
13 years 11 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ESEC
1999
Springer
13 years 11 months ago
The CIP Method: Component- and Model-Based Construction of Embedded Systems
CIP is a model-based software development method for embedded systems. The problem of constructing an embedded system is decomposed into a functional and a connection problem. The ...
Hugo Fierz
COOPIS
1996
IEEE
13 years 11 months ago
Integrity Constraint Checking in Federated Databases
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
Paul W. P. J. Grefen, Jennifer Widom
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
13 years 11 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
CIKM
1994
Springer
13 years 11 months ago
Semantics-Based Information Brokering
The rapid advances in computer and communication technologies, and their merger, is leading to a global information market place. It will consist of federations of very large numb...
Vipul Kashyap, Amit P. Sheth