Sciweavers

5638 search results - page 21 / 1128
» On presence
Sort
View
SEKE
2007
Springer
14 years 3 months ago
Query Processing in Paraconsistent Databases in the Presence of Integrity Constraints
In this paper, we present an approach to query processing for paraconsistent databases in the presence of integrity constraints. Paraconsistent databases are capable of representi...
Navin Viswanath, Rajshekhar Sunderraman
CNSR
2005
IEEE
14 years 3 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
HHCI
2000
14 years 1 months ago
The Sense of Object-Presence with Projection-Augmented Models
Projection-augmented models are a type of non-immersive, coincident haptic and visual display that uses a physical model as a three dimensional screen for projected visual informa...
Brett Stevens, Jennifer Jerrams-Smith
IFIP
2000
Springer
14 years 1 months ago
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations
: IEEE 802.11 is a wireless network standard that was completed in 1997. Unfortunately, the medium access protocol described in the standard meets some problems that arise from the...
Marek Natkaniec, Andrzej R. Pach
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb