Sciweavers

1995 search results - page 67 / 399
» What's the Problem
Sort
View
110
Voted
SPW
2004
Springer
15 years 9 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
100
Voted
GROUP
2003
ACM
15 years 9 months ago
Process inheritance and instance modification
Process technologies play an increasingly important role as the world is being digitalized in nearly every corner. The major obstacles to their massive deployment include reusabil...
Guangxin Yang
137
Voted
GRID
2006
Springer
15 years 3 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
SODA
2010
ACM
178views Algorithms» more  SODA 2010»
16 years 1 months ago
Tree Embeddings for Two-Edge-Connected Network Design
The group Steiner problem is a classical network design problem where we are given a graph and a collection of groups of vertices, and want to build a min-cost subgraph that conne...
Anupam Gupta, Ravishankar Krishnaswamy, R. Ravi
124
Voted
CONTEXT
2007
Springer
15 years 9 months ago
The Role of Context in Image Interpretation
The problem we address in this paper is the role of context in the interpretation of images when pictures are used as queries. An image usually depicts several objects and is open...
Dag Elgesem, Joan C. Nordbotten