Sciweavers

448 search results - page 32 / 90
» Who is in Control
Sort
View
118
Voted
DBSEC
2000
112views Database» more  DBSEC 2000»
15 years 5 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
130
Voted
SCM
1998
15 years 5 months ago
Toward SCM / PDM Integration?
Software Configuration Management (SCM) is the discipline of controlling the evolution of a software product. Product Data Management (PDM) is the disciple of designing and control...
Jacky Estublier, Jean-Marie Favre, Philippe Morat
164
Voted
DBSEC
2010
196views Database» more  DBSEC 2010»
15 years 20 days ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
HRI
2011
ACM
14 years 7 months ago
Human-robot proxemics: physical and psychological distancing in human-robot interaction
To seamlessly integrate into the human physical and social environment, robots must display appropriate proxemic behavior—that is, follow societal norms in establishing their ph...
Jonathan Mumm, Bilge Mutlu
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
15 years 2 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...