Sciweavers

9380 search results - page 1780 / 1876
» Collaborative information system design
Sort
View
EUROCRYPT
2010
Springer
15 years 9 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
DEBS
2007
ACM
15 years 8 months ago
High frequency distributed data stream event correlation to improve neonatal clinical management
Approximately eighteen percent (18%) of babies born in New South Wales (NSW), Australia require special care or neonatal intensive care admission. Premature babies can be up to 17...
Carolyn McGregor, Michael Stacey
FASE
2007
Springer
15 years 8 months ago
A Family of Distributed Deadlock Avoidance Protocols and Their Reachable State Spaces
Abstract. We study resource management in distributed systems. Incorrect handling of resources may lead to deadlocks, missed deadlines, priority inversions, and other forms of inco...
César Sánchez, Henny B. Sipma, Zohar...
SOUPS
2010
ACM
15 years 8 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ATAL
2006
Springer
15 years 8 months ago
Magenta technology multi-agent logistics i-Scheduler for road transportation
The paper describes main features of an Intelligent Scheduler for Road Transportation Applications based on Magenta agent technology and characterized by a number of unique, advan...
Jonathan Himoff, George Rzevski, Petr Skobelev
« Prev « First page 1780 / 1876 Last » Next »