Sciweavers

711 search results - page 122 / 143
» Web service access management for integration with agent sys...
Sort
View
ISADS
1999
IEEE
14 years 1 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ADB
1994
311views Database» more  ADB 1994»
14 years 27 days ago
A Personal and Portable Database Server: the CQL Card
Database applications and technologies are of central importance in many information systems a person may encounter. To obtain services, the end-users are required a smart card (pl...
Pierre Paradinas, Jean-Jacques Vandewalle
WWW
2010
ACM
14 years 3 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
SOCA
2007
IEEE
14 years 3 months ago
A Service-oriented Architecture for Business Intelligence
Business intelligence is a business management term used to describe applications and technologies which are used to gather, provide access to and analyze data and information abo...
Liya Wu, Gilad Barash, Claudio Bartolini
ATAL
2007
Springer
14 years 3 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...