Sciweavers

6662 search results - page 1258 / 1333
» Mobile and Ubiquitous Computing
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 9 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
NIPS
2001
13 years 9 months ago
KLD-Sampling: Adaptive Particle Filters
Over the last years, particle filters have been applied with great success to a variety of state estimation problems. We present a statistical approach to increasing the efficienc...
Dieter Fox
WSC
2004
13 years 9 months ago
Modeling Real-World Control Systems: Beyond Hybrid Systems
Hybrid system modeling refers to the construction of system models combining both continuous and discrete dynamics. These models can greatly reduce the complexity of a phystem mod...
Stephen Neuendorffer
WSCG
2004
165views more  WSCG 2004»
13 years 9 months ago
A Client-Server-Scenegraph for the Visualization of Large and Dynamic 3D Scenes
With the increasing capabilities of hardware for 3D graphics and network, 3D multi-user environments get more and more interesting for e-business, entertainment and cooperative wo...
Jörg Sahm, Ingo Soetebier
« Prev « First page 1258 / 1333 Last » Next »