Sciweavers

17552 search results - page 3428 / 3511
» Signal-regulated systems and networks
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ECIS
2003
13 years 10 months ago
A multi-model algorithm for the cost-oriented design of the information technology infrastructure
Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Danilo Ardagna, Chiara Francalanci, Marco Trubian
ECIS
2003
13 years 10 months ago
The impact of software patents on the structure of the software market - a simulation model
The issue of software patents is widely discussed in Europe today. The standard economic rationale for patents is to protect potential innovators from imitation, which ultimately ...
Norman Hoppen, Daniel Beimborn, Wolfgang Köni...
MASCOTS
2001
13 years 10 months ago
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem
As the Internet commerce becomes a more important part of the economy, network security is receiving more emphasis. Time spent in data encryption can be a significant performance ...
Zhi Li, John Higgins, Mark J. Clement
IADIS
2003
13 years 10 months ago
Personalization of Information Delivery by the Use of Agents
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
Jarogniew Rykowskia, Arkadiusz Juszkiewicz
« Prev « First page 3428 / 3511 Last » Next »