Sciweavers

445 search results - page 68 / 89
» Authorization and Access Control in IRO-DB
Sort
View
CHI
2004
ACM
15 years 10 months ago
EyeDraw: a system for drawing pictures with the eyes
This paper describes the development of EyeDraw, a software system that enables children with severe motor impairments to draw pictures by just moving their eyes. EyeDraw will hel...
Anthony J. Hornof, Anna Cavender, Rob Hoselton
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
15 years 9 months ago
The hyperion project: from data integration to data coordination
We present an architecture and a set of challenges for peer database management systems. These systems team up to build a network of nodes (peers) that coordinate at run time most...
Marcelo Arenas, Vasiliki Kantere, Anastasios Kemen...
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 2 months ago
A First Person IP over HDSL Case Study
As many authors have articulated, the “last mile problem” is often cited as a persistent engineering obstacle in deploying residential broadband solutions. Additionally, some ...
Wayne Smith
PODC
2003
ACM
15 years 2 months ago
Oblivious signature-based envelope
We propose a new cryptographic primitive called oblivious signaturebased envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a ...
Ninghui Li, Wenliang Du, Dan Boneh
IJISEC
2006
113views more  IJISEC 2006»
14 years 9 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...