Sciweavers

331 search results - page 18 / 67
» Special Issue on Time-Delay Systems
Sort
View
GI
2009
Springer
14 years 2 months ago
Improving Usability of Integrated Emergency Response Systems: The SoKNOS Approach
: Implementing systems for emergency response poses various challenges. Information from various sources and systems needs to be integrated, processed, aggregated, and visualized i...
Heiko Paulheim, Sebastian Döweling, Karen H. ...
EMSOFT
2008
Springer
14 years 19 days ago
Wireless channel access reservation for embedded real-time systems
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 5 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
CSFW
2002
IEEE
14 years 3 months ago
Secrecy in Multiagent Systems
We introduce a general framework for reasoning about secrecy requirements in multiagent systems. Because secrecy requirements are closely connected with the knowledge of individua...
Joseph Y. Halpern, Kevin R. O'Neill
IEEEARES
2007
IEEE
14 years 5 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...