Sciweavers

7112 search results - page 1236 / 1423
» Power in normative systems
Sort
View
ACSW
2003
13 years 10 months ago
A Survey of Research on Context-Aware Homes
The seamless integration of people, devices and computation will soon become part of our daily life. Sensors, actuators, wireless networks and ubiquitous devices powered by intelli...
Sven Meyer, Andry Rakotonirainy
ICISC
2004
96views Cryptology» more  ICISC 2004»
13 years 10 months ago
Efficient Broadcast Encryption Using Multiple Interpolation Methods
We propose a new broadcast encryption scheme based on polynomial interpolations. Our scheme, obtained from the Naor-Pinkas scheme by partitioning the user set and interpolating mul...
Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwa...
FDBS
2001
108views more  FDBS 2001»
13 years 10 months ago
Combining a Formal with an Example-driven Approach for Data Integration
Integrating data sources is a general problem in many scenarios. The main problem is the heterogeneity between data sources which were created and developed separately. In the lit...
Ingolf Geist, Kai-Uwe Sattler, Ingo Schmitt
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 10 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
IMSA
2001
131views Multimedia» more  IMSA 2001»
13 years 10 months ago
SORBA: Shared Object Request Broker Architecture for Peer Computing
: In this paper, we proposed a SORBA (Shared Object Request Broker Architecture) model, an objectbased P2P model, which complies with an open architecture, and manages resources af...
U. G. Kang, H. J. Hwang, S. H. Lee, C. J. Wang
« Prev « First page 1236 / 1423 Last » Next »