Sciweavers

1116 search results - page 171 / 224
» Secure Mediation: Requirements and Design
Sort
View
SAFECOMP
1998
Springer
14 years 1 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
AGENTS
1997
Springer
14 years 1 months ago
INSIGHT: A Virtual Laboratory for Looking into Behavior-Based Autonomous Agents
This paper introduces a 3D simulation environment for experiments with behavior-based autonomous agents. The virtual laboratory INSIGHT allows the user to design and run a great v...
Simone Strippgen
ACMSE
2007
ACM
14 years 1 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
SAC
2010
ACM
14 years 4 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
GLOBECOM
2008
IEEE
14 years 3 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...