Sciweavers

2250 search results - page 84 / 450
» Authorizing applications in singularity
Sort
View
WCNC
2010
IEEE
15 years 1 months ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
WSC
2008
15 years 6 days ago
An integrated CAD and simulation model for concrete operations
Pouring a concrete raft slab is a classic problem in downtown projects because it requires special arrangements to be made with city authorities to close the area around the proje...
Aly Abdel Fattah, Janaka Y. Ruwanpura
WCE
2007
14 years 11 months ago
Iterative Single-Image Digital Super-Resolution Using Partial High-Resolution Data
—The subject of extracting high-resolution data from low-resolution images is one of the most important digital processing applications in recent years, attracting much research....
Eran Gur, Zeev Zalevsky
ADHOC
2008
118views more  ADHOC 2008»
14 years 10 months ago
A localized certificate revocation scheme for mobile ad hoc networks
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no on-line access to trusted authorities, is a challenging problem. In wired network environ...
Geneviève Arboit, Claude Crépeau, Ca...
IJCSA
2006
111views more  IJCSA 2006»
14 years 10 months ago
Using DocBook and XML Technologies to Create Adaptive Learning Content in Technical Domains
This work presents an XML-based authoring methodology that facilitates the different tasks associated with the development of standards-compliant e-learning content development. T...
Iván Martínez-Ortiz, Pablo Moreno-Ge...