Sciweavers

448 search results - page 30 / 90
» Who is in Control
Sort
View
ECTEL
2007
Springer
15 years 10 months ago
Exploiting Policies in an Open Infrastructure for Lifelong Learning
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
BNCOD
2003
150views Database» more  BNCOD 2003»
15 years 5 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray
116
Voted
AMAST
2004
Springer
15 years 9 months ago
Counting Votes with Formal Methods
This abstract provides some background information about the electronic voting experiment that is planned in the Netherlands for the European Elections of 2004, and about our own i...
Bart Jacobs
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
15 years 7 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
CHI
2003
ACM
15 years 9 months ago
SeismoSpin: a physical instrument for digital data
SeismoSpin is a novel interactive instrument designed around a “Disc-Jockey/mixer” metaphor that gives seismologists a quick and powerful way to explore earthquake data. The c...
Mark McKelvin, Ragnhild Nestande, Leticia Valdez, ...