Sciweavers

2061 search results - page 181 / 413
» Authorization for Metacomputing Applications
Sort
View
WSNA
2003
ACM
15 years 9 months ago
Fast authenticated key establishment protocols for self-organizing sensor networks
In this paper, we consider efficient authenticated key This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in...
Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bed...
HICSS
2002
IEEE
101views Biometrics» more  HICSS 2002»
15 years 9 months ago
Groupware Case Studies: Electronic Meeting Systems in the Work Place
This paper presents data collected from 5 real-world (federal, state and commercial) groups as they undertook their real-world (Business Process Reengineering (BPR) and Joint Appl...
Gail Corbitt, Ben Martz
118
Voted
IEEEMSP
2002
IEEE
115views Multimedia» more  IEEEMSP 2002»
15 years 9 months ago
Aerial communications using piano, clarinet, and bells
— This work explores novel mechanisms for aerial acoustic machine-machine communications. It builds on previous work by some of the authors [1], as well as others [2]. In this pa...
Natacha Domingues, Joáo Lacerda, Pedro M. Q...
GECCO
2009
Springer
115views Optimization» more  GECCO 2009»
15 years 9 months ago
Rapid prototyping using evolutionary approaches: part 2
In this paper we extend the work done in [5], where authors have proposed a evolutionary multi-objective approach to Rapid Prototyping (RP), to decipher optimal build orientation ...
Nikhil Padhye, Subodh Kalia
ICSOC
2009
Springer
15 years 9 months ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...