Sciweavers

587 search results - page 99 / 118
» Role updating for assignments
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 9 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
ICSE
2005
IEEE-ACM
14 years 9 months ago
Re-engineering software architecture of home service robots: a case study
With the advances of robotics, computer science, and other related areas, home service robots attract much attention from both academia and industry. Home service robots consists ...
Moonzoo Kim, Jaejoon Lee, Kyo Chul Kang, Youngjin ...
MOBIHOC
2005
ACM
14 years 8 months ago
Scalable location services for hierarchically organized mobile ad hoc networks
This paper proposes a location service to assist location-based routing protocols, realized through a novel Associativity-Based clustering protocol. The main goal of our scheme, w...
Siva Sivavakeesar, George Pavlou
INFOCOM
2009
IEEE
14 years 3 months ago
Graceful Network Operations
—A significant fraction of network events (such as topology or route changes) and the resulting performance degradation stem from premeditated network management and operational...
Saqib Raza, Yuanchen Zhu, Chen-Nee Chuah
AMT
2009
Springer
263views Multimedia» more  AMT 2009»
14 years 3 months ago
A Dynamic Trust Network for Autonomy-Oriented Partner Finding
The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities. It can be found in open and distributed environment...
Hongjun Qiu, Jiming Liu, Ning Zhong