Sciweavers

9182 search results - page 121 / 1837
» Requirements for Requirements Management Tools
Sort
View
ASIACRYPT
2003
Springer
14 years 22 days ago
Efficient Group Signatures without Trapdoors
Abstract. Group signature schemes are fundamental cryptographic tools that enable unlinkably anonymous authentication, in the same fashion that digital signatures provide the basis...
Giuseppe Ateniese, Breno de Medeiros
PAKM
1998
13 years 10 months ago
Knowledge Asset Road Maps
This paper describes how AIAI has used the ideas and techniques behind Technology Road Maps in order to provide a framework for developing Knowledge Asset Road Maps to support kno...
Ann Macintosh, Ian Filby, Austin Tate
CIDR
2009
102views Algorithms» more  CIDR 2009»
13 years 10 months ago
Why Did My Query Slow Down
Enterprise environments have isolated teams responsible separately for database management and the management of underlying networkattached server-storage infrastructure (referred...
Nedyalko Borisov, Sandeep Uttamchandani, Ramani Ro...
CRITIS
2006
14 years 24 days ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
ISMIS
1997
Springer
14 years 1 months ago
Intelligent Computation of Presentation Documents
Intelligent presentation of data requires exibility of expression based on user needs and data content, both of which evolve. This exibility is not o ered by the current generatio...
Joseph D. Oldham, V. Wiktor Marek, Miroslaw Truszc...