Sciweavers

650 search results - page 74 / 130
» Distorting symmetric designs
Sort
View
WETICE
1996
IEEE
14 years 29 days ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
DELTA
2008
IEEE
13 years 10 months ago
Experimental Characterisations of Coupled Transmission Lines
Coupled transmission lines are experimentally characterised by using 4-port s-parameter measurements in the broad frequency band (up to more than the 20GHz). The test patterns are...
Dongchul Kim, Taehoon Kim, Jung-A Lee, Yungseon Eo
INTERACT
2003
13 years 10 months ago
The YoYo: A Handheld Device Combining Elastic and Isotonic Input
: We present a new input device for controlling three-dimensional graphics applications: the YoYo. The device consists of three elastically connected rings in a row, which can be m...
Andreas Simon, Bernd Froehlich
ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 10 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
ORL
2008
77views more  ORL 2008»
13 years 8 months ago
A short proof of the VPN Tree Routing Conjecture on ring networks
The VPN Tree Routing Conjecture states that there always exists an optimal solution to the symmetric Virtual Private Network Design (sVPND) problem where the paths between all ter...
Fabrizio Grandoni, Volker Kaibel, Gianpaolo Oriolo...