Sciweavers

8499 search results - page 122 / 1700
» cans 2009
Sort
View
ICIC
2009
Springer
15 years 11 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
ICMT
2009
Springer
15 years 11 months ago
A Collection Operator for Graph Transformation
Abstract. Graph transformation has a well-established theory and associated tools that can be used to perform model transformations. However, the lack of a construct to match and t...
Roy Grønmo, Stein Krogdahl, Birger Mø...
ICOST
2009
Springer
15 years 11 months ago
An Architecture to Combine Context Awareness and Body Sensor Networks for Health Care Applications
Information derived from wearable sensors, such as illness/fall alarms, can be enhanced with context information to provide advanced health care and assisted living applications. I...
Alessia Salmeri, Carlo Alberto Licciardi, Luca Lam...
ICTAC
2009
Springer
15 years 11 months ago
On the Expressiveness of Forwarding in Higher-Order Communication
Abstract. In higher-order process calculi the values exchanged in communications may contain processes. There are only two capabilities for received processes: execution and forwar...
Cinzia Di Giusto, Jorge A. Pérez, Gianluigi...
ICTAC
2009
Springer
15 years 11 months ago
Regular Expressions with Numerical Constraints and Automata with Counters
Abstract. Regular expressions with numerical constraints are an extension of regular expressions, allowing to bound numerically the number of times that a subexpression should be m...
Dag Hovland