Sciweavers

469 search results - page 60 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
SMI
1999
IEEE
108views Image Analysis» more  SMI 1999»
14 years 22 days ago
Modeling of Surfaces with Fair Reflection Line Pattern
Inspection of reflection line patterns is a standard way to check the quality of free form surfaces. In this paper, we describe an approach which enables the designer to control d...
Joachim Loos, Günther Greiner, Hans-Peter Sei...
ATAL
2006
Springer
13 years 10 months ago
Autonomous agents for air-traffic deconfliction
This contribution presents a deployment exercise of multiagent technology in the domain of deconflicted air-traffic control among several autonomous aerial vehicles (manned as wel...
Michal Pechoucek, David Sislák, Dusan Pavl&...
IQ
2001
13 years 9 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
VTC
2010
IEEE
162views Communications» more  VTC 2010»
13 years 6 months ago
Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications
—The IEEE 1609.4 standard has been proposed to provide multi-channel operations in wireless access for vehicular environments (WAVE), where all the channels are periodically sync...
Jui-Hung Chu, Kai-Ten Feng, Chen-Nee Chuah, Chin-F...
SACMAT
2011
ACM
12 years 11 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...