Sciweavers

802 search results - page 97 / 161
» Building Adaptive Applications using Active Mediators
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 5 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
WSC
2007
15 years 6 months ago
Using ontologies for simulation integration
This paper describes the motivations, methods, and solution concepts for the use of ontologies for simulation model integration. Ontological analysis has been shown to be an effec...
Perakath C. Benjamin, Kumar V. Akella, Ajay Verma
VIS
2009
IEEE
167views Visualization» more  VIS 2009»
16 years 5 months ago
Focus+Context Route Zooming and Information Overlay in 3D Urban Environments
In this paper we present a novel focus+context zooming technique, which allows users to zoom into a route and its associated landmarks in a 3D urban environment from a 45-degree bi...
Huamin Qu, Haomian Wang, Weiwei Cui, Yingcai Wu...
ISWC
2003
IEEE
15 years 9 months ago
Layered Annotations of Digital Images for Data Collection in the Field
This paper presents the development and initial user trial of a wearable computer for collecting and annotating images for field-working applications. The application is based upo...
James Cross, Chris Baber, Sandra I. Woolley
INFOCOM
2012
IEEE
13 years 6 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...