Sciweavers

1006 search results - page 114 / 202
» What is this page known for
Sort
View
CSFW
2006
IEEE
14 years 2 months ago
On Key Assignment for Hierarchical Access Control
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key ...
Jason Crampton, Keith M. Martin, Peter R. Wild
E2EMON
2006
IEEE
14 years 2 months ago
An Analysis of Active End-to-end Bandwidth Measurements in Wireless Networks
— For active, probing-based bandwidth measurements performed on top of the unifying IP layer, it may seem reasonable to expect the measurement problem in wireless networks to be ...
Andreas Johnsson, Mats Björkman, Bob Melander
HICSS
2006
IEEE
97views Biometrics» more  HICSS 2006»
14 years 2 months ago
Organizational Transformation through Business Models: A Framework for Business Model Design
Organizations are increasingly inter-connected as they source talent, goods and services from other organizations located in disparate parts of the world. They seek new ways of cr...
Peter Keen, Sajda Qureshi
IROS
2006
IEEE
247views Robotics» more  IROS 2006»
14 years 2 months ago
Towards Open-Ended 3D Rotation and Shift Invariant Object Detection for Robot Companions
- Robot companions need to be able to constantly acquire knowledge about new objects for instance in order to detect them in the environment. This ability is necessary since it is ...
Jens Kubacki, Winfried Baum
SAC
2006
ACM
14 years 2 months ago
KALA: Kernel Aspect language for advanced transactions
Transaction management is a known crosscutting concern. Previous research has been conducted to express this concern as an aspect. However, such work has used general-purpose aspe...
Johan Fabry, Theo D'Hondt