Sciweavers

1669 search results - page 126 / 334
» Modeling ODP Computational Specifications Using UML
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 9 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
QOSA
2007
Springer
14 years 3 months ago
Extending the Capabilities of Component Models for Embedded Systems
Component-based development helps to improve the modularity and reusability of embedded systems. Component models devised for embedded systems are typically restricted due to the l...
Ihor Kuz, Yan Liu
SIGGRAPH
1993
ACM
14 years 1 months ago
Pad: an alternative approach to the computer interface
We believe that navigation in information spaces is best supported by tapping into our natural spatial and geographic ways of thinking. To this end, we are developing a new comput...
Ken Perlin, David Fox
DASC
2006
IEEE
14 years 26 days ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
ACSC
2010
IEEE
13 years 4 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown