Sciweavers

1611 search results - page 114 / 323
» Experimental Integration of Planning in a Distributed Contro...
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
IJIPT
2007
111views more  IJIPT 2007»
13 years 9 months ago
System architecture of a mobile message transport system
Many scenarios of beyond 3G mobile communications describe the integration of various access technologies into one system. Being always best connected under certain optimization c...
Bernd Gloss
BPM
2000
Springer
191views Business» more  BPM 2000»
14 years 1 months ago
ARIS Architecture and Reference Models for Business Process Management
In this article a general business process architecture is presented, which is based on the Architecture of Integrated Information Systems (ARIS) and which is composed of the four ...
August-Wilhelm Scheer, Markus Nüttgens
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
13 years 7 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
VISUALIZATION
1999
IEEE
14 years 1 months ago
Digital Design of a Surgical Simulator for Interventional Magnetic Resonance Imaging
We present the design of a simulator for a prototype interventional magnetic resonance imaging scanner. This MRI scanner is integrated with an operating theater, enabling new tech...
Terry S. Yoo, Penny Rheingans