Sciweavers

2917 search results - page 570 / 584
» Adaptation and the effort needed to adapt
Sort
View
JCS
2006
116views more  JCS 2006»
15 years 1 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
JSW
2008
124views more  JSW 2008»
15 years 1 months ago
Information Storage and Retrieval Schemes for Recycling Products
A recycling object is in its recycle chain and its status may often change according to recycling stage or reusing status; even its structure could often dynamically change accordi...
Takayuki Tsuchida, Teppei Shimada, Tatsuo Tsuji, K...
JUCS
2008
156views more  JUCS 2008»
15 years 1 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JUCS
2008
161views more  JUCS 2008»
15 years 1 months ago
A Model-Driven Approach to Align Business Processes with User Interfaces
: Information Technology (IT) has evolved over time from its traditional use as administrative support towards a more strategic role to enforce business processes (BP). But several...
Kênia Soares Sousa, Hildeberto Mendonç...
JLP
2006
155views more  JLP 2006»
15 years 1 months ago
A formally grounded software specification method
One of the goals of software engineering is to provide what is necessary to write relevant, legible, useful descriptions of the systems to be developed, which will be the basis of...
Christine Choppy, Gianna Reggio