Sciweavers

199 search results - page 33 / 40
» Developing a security protocol for a distributed decision su...
Sort
View
AAAI
2006
13 years 9 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
MSE
2002
IEEE
119views Hardware» more  MSE 2002»
14 years 13 days ago
Narnia: A Virtual Machine for Multimedia Communication Services
Narnia is middleware that helps programmers build multimedia communication services. This middleware ollection of familiar programming abstractions— including events, event hand...
Mauricio Cortes, J. Robert Ensor
RTSS
2007
IEEE
14 years 1 months ago
FireFly Mosaic: A Vision-Enabled Wireless Sensor Networking System
— With the advent of CMOS cameras, it is now possible to make compact, cheap and low-power image sensors capable of on-board image processing. These embedded vision sensors provi...
Anthony Rowe, Dhiraj Goel, Raj Rajkumar
EUROCRYPT
2004
Springer
14 years 28 days ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
HPCN
1999
Springer
13 years 11 months ago
Towards a Scalable Metacomputing Storage Service
We describe a prototypical storage service through which we are addressing some of the open storage issues in wide-area distributed high-performance computing. We discuss some of t...
Craig J. Patten, Kenneth A. Hawick, J. F. Hercus