Sciweavers

23 search results - page 3 / 5
» A card requirements language enabling privacy-preserving acc...
Sort
View
DPD
2007
100views more  DPD 2007»
14 years 9 months ago
Sharing hierarchical context for mobile web services
Context has the potential to enhance Web services in mobile environments to a great extent. Yet, challenges such as bandwidth restriction or dynamic changes require considerations ...
Christoph Dorn, Schahram Dustdar
IFIP
2003
Springer
15 years 2 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
BMCBI
2006
97views more  BMCBI 2006»
14 years 9 months ago
Goulphar: rapid access and expertise for standard two-color microarray normalization methods
Background: Raw data normalization is a critical step in microarray data analysis because it directly affects data interpretation. Most of the normalization methods currently used...
Sophie Lemoine, Florence Combes, Nicolas Servant, ...
85
Voted
CCS
2005
ACM
15 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
96
Voted
COMPSAC
2001
IEEE
15 years 1 months ago
Utilizing Object-Oriented Databases for Concurrency Control in Virtual Environments
Virtual Reality Modeling Language (VRML) is widely used to represent, create, and display virtual reality objects and their environment. Some VRML applications require concurrent ...
Damla Turgut, Nevin Aydin, Ramez Elmasri, Begumhan...