Sciweavers

2421 search results - page 172 / 485
» Message from the Editor-in-Chief
Sort
View
ISPEC
2005
Springer
14 years 4 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
INFOCOM
2003
IEEE
14 years 4 months ago
Network Layer Support for Service Discovery in Mobile Ad Hoc Networks
— Service discovery is an integral part of the ad hoc networking to achieve stand-alone and self-configurable communication networks. In this paper, we discuss possible service ...
Ulas C. Kozat, Leandros Tassiulas
HUC
2003
Springer
14 years 4 months ago
Evaluation of Visual Notification Cues for Ubiquitous Computing
With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-in...
Peter Tarasewich, Christopher S. Campbell, Tian Xi...
ICPADS
2002
IEEE
14 years 3 months ago
Self-Stabilizing Wormhole Routing on Ring Networks
Wormhole routing is most common in parallel architectures in which messages are sent in small fragments called flits. It is a lightweight and efficient method of routing message...
Ajoy Kumar Datta, Maria Gradinariu, Anthony B. Ken...
HICSS
2000
IEEE
138views Biometrics» more  HICSS 2000»
14 years 3 months ago
The NZDIS Project: An Agent-based Distributed Information Systems Architecture
This paper describes an architecture for building distributed information systems from existing information resources, based on software agent and distributed object technologies....
Martin K. Purvis, Stephen Cranefield, Geoff Bush, ...