Sciweavers

825 search results - page 118 / 165
» Internal Iteration Externalized
Sort
View
ITIIS
2010
128views more  ITIIS 2010»
13 years 6 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
TRUST
2010
Springer
13 years 6 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
DLOG
2010
13 years 5 months ago
Towards Soundness Preserving Approximation for ABox Reasoning of OWL2
ABox Reasoning in large scale description logic (DL) knowledge bases, e.g. ontologies, is important for the success of many semantic-enriched systems. Performance of existing appro...
Yuan Ren, Jeff Z. Pan, Yuting Zhao
GI
2009
Springer
13 years 5 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson
EUROMED
2010
13 years 5 months ago
Assessing the Socio-economic Impact of 3D Visualisation in Cultural Heritage
Despite the multitude of impact measurement techniques available to heritage site managers there is a case for the bigger strategic picture to figure more strongly in impact measur...
Jaime Kaminski, Jim McLoughlin, Babak Sodagar