Sciweavers

324 search results - page 62 / 65
» Model Transformations in Practice Workshop
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 1 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 1 months ago
Joint Channel Estimation and Synchronization with Inter-carrier Interference Reduction for OFDM
This paper proposes a pilot-aided joint channel estimation and synchronization scheme for burst-mode orthogonal frequency division multiplexing (OFDM) systems. The scheme eliminate...
Hung Nguyen-Le, Tho Le-Ngoc, Chi Chung Ko
PODC
2004
ACM
14 years 16 days ago
On the design of distributed protocols from differential equations
We propose a framework to translate certain subclasses of differential equation systems into distributed protocols that are practical. The synthesized protocols are state machine...
Indranil Gupta
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
14 years 15 days ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
CITA
2003
IEEE
14 years 12 days ago
Internet Diffusion and E-Business Opportunities Amongst Malaysian Travel Agencies
This paper reports an investigation into the adoption of the Internet amongst Malaysian travel agencies as a means of exploring the likely future potential growth of e-business wi...
Raja Mazhatul Yasmin Suraya