Sciweavers

135 search results - page 12 / 27
» Idea: Trusted Emergency Management
Sort
View
CSREASAM
2006
13 years 10 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
WETICE
1998
IEEE
14 years 24 days ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
HT
2009
ACM
14 years 3 months ago
Weblog as a personal thinking space
While weblogs have been conceptualised as personal thinking spaces since their early days, those uses have not been studied in detail. The purpose of this paper is to explore how ...
Lilia Efimova
BROADNETS
2004
IEEE
14 years 9 days ago
Policy-Based Hybrid Hierarchical Optical Networks
This document presents provisioning strategies for emerging hybrid optical networks. The idea is to make use of policy-based management that guides the behavior of a network throu...
Belkacem Daheb, Wissam Fawaz, Olivier Audouin, Bel...
OTM
2009
Springer
14 years 3 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...