Sciweavers

3057 search results - page 359 / 612
» Complexity management
Sort
View
ISCI
2008
160views more  ISCI 2008»
15 years 4 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
129
Voted
IJNSEC
2006
112views more  IJNSEC 2006»
15 years 4 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
CORR
2007
Springer
93views Education» more  CORR 2007»
15 years 4 months ago
Collaborative product and process model: Multiple Viewpoints approach
The design and development of complex products invariably involves many actors who have different points of view on the problem they are addressing, the product being developed, a...
Hichem Geryville, Abdelaziz Bouras, Yacine Ouzrout...
IWC
2006
92views more  IWC 2006»
15 years 4 months ago
Awareness and teamwork in computer-supported collaborations
A contemporary approach to describing and theorizing about joint human endeavor is to posit `knowledge in common' as a basis for awareness and coordination. Recent analysis h...
John M. Carroll, Mary Beth Rosson, Gregorio Conver...
IJWET
2007
114views more  IJWET 2007»
15 years 4 months ago
A comprehensive design model for integrating business processes in web applications
: Web applications have evolved from simple read-only websites to complex data- and operation-intensive systems. The main goal of this kind of application is to provide the users w...
Damiano Distante, Gustavo Rossi, Gerardo Canfora, ...