Sciweavers

1663 search results - page 258 / 333
» Privacy and Identity Management
Sort
View
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
15 years 9 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
ICMB
2005
IEEE
189views Business» more  ICMB 2005»
15 years 9 months ago
Wireless Remote Healthcare Monitoring with Motes
As the world’s aged population grows many governments are looking to remote healthcare monitoring solutions. It is certainly cheaper to keep the elderly and infirm in their own ...
Einstein Lubrin, Elaine Lawrence, Karla Felix Nava...
OOPSLA
2005
Springer
15 years 9 months ago
An interactive visualization of refactorings retrieved from software archives
We perform knowledge discovery in software archives in order to detect refactorings on the level of classes and methods. Our REFVIS prototype finds these refactorings in CVS repo...
Peter Weißgerber, Stephan Diehl, Carsten G&o...
SAFECOMP
2005
Springer
15 years 9 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
ICCNMC
2005
Springer
15 years 9 months ago
DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing
The emergence of Internet, Intranet, local area networks, and ad hoc wireless networks introduces a plethora of new problems in information processing. In order to overcome these p...
Jinlong Wang, Congfu Xu, Huifeng Shen, Zhaohui Wu,...