Sciweavers

44 search results - page 8 / 9
» Reasoning about Secrecy for Active Networks
Sort
View
COMPUTER
2004
162views more  COMPUTER 2004»
13 years 5 months ago
Context-Aware Trails
The growth of ubiquitous computing has given rise to a range of possibilities for context-based application development. Technologies for mobile computing and context-awareness can...
Siobhán Clarke, Cormac Driver
EUROCRYPT
2003
Springer
13 years 10 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
PERCOM
2006
ACM
14 years 5 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
RE
2006
Springer
13 years 5 months ago
Interaction Analysis in Aspect-Oriented Models
Aspect-oriented concepts are currently introduced in all phases of the software development life cycle. However, the complexity of interactions among different aspects and between...
Katharina Mehner, Mattia Monga, Gabriele Taentzer
AEI
2004
114views more  AEI 2004»
13 years 5 months ago
Physical concept ontology for the knowledge intensive engineering framework
Knowledge intensive engineering aims at flexible applications of a variety of product life cycle knowledge, such as design, manufacturing, operations, maintenance, and recycling. ...
Masaharu Yoshioka, Yasushi Umeda, Hideaki Takeda, ...