Sciweavers

468 search results - page 80 / 94
» Challenges and Directions for Semantic Communication
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
14 years 10 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
RTAS
2005
IEEE
15 years 3 months ago
Convoy Driving through Ad-Hoc Coalition Formation
— Convoy driving on public highways is a useful phenomena which increases the safety and the throughput of the highway. We present an approach through which a wireless Convoy Dri...
Majid Ali Khan, Ladislau Bölöni
MICRO
2003
IEEE
125views Hardware» more  MICRO 2003»
15 years 2 months ago
WaveScalar
Silicon technology will continue to provide an exponential increase in the availability of raw transistors. Effectively translating this resource into application performance, how...
Steven Swanson, Ken Michelson, Andrew Schwerin, Ma...
INFOCOM
2000
IEEE
15 years 2 months ago
Multimedia Proxy Caching Mechanism for Quality Adaptive Streaming Applications in the Internet
— The Internet has witnessed a rapid growth in deployment of Web-based streaming applications during recent years. In these applications, server should be able to perform end-to-...
Reza Rejaie, Haobo Yu, Mark Handley, Deborah Estri...
INFOCOM
2010
IEEE
14 years 8 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...