Sciweavers

1314 search results - page 253 / 263
» The Impact of Active Networks on Established Network Operato...
Sort
View
MAS
1998
Springer
145views Communications» more  MAS 1998»
13 years 12 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
ETT
2006
154views Education» more  ETT 2006»
13 years 7 months ago
Digital switchover in UHF: the ATHENA concept for broadband access
This paper presents a concept adopted by ATHENA IST-507312 project for the proper adoption of digital switchover (DSO), i.e. the transition form analogue to digital broadcasting in...
Evangelos Pallis, Charalambos Mantakas, George Mas...
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
ICRA
2005
IEEE
168views Robotics» more  ICRA 2005»
14 years 1 months ago
Control of Scalable Wet SMA Actuator Arrays
- This paper presents a new control method to drive an array of wet Shape Memory Alloy actuators utilizing a Matrix Manifold and Valve system (MMV). The MMV architecture allows a v...
L. Flemming, Stephen A. Mascaro
WM
2003
13 years 9 months ago
Knowledge discovery methods
: Coping with complex and dynamic environments forces companies to invest in the resource knowledge for the maintenance of their operational reliability; they have to create and to...
Stefan Smolnik