Sciweavers

7189 search results - page 1102 / 1438
» Connecting Design with Code
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
ANTSW
2004
Springer
15 years 8 months ago
Cooperative Transport of Objects of Different Shapes and Sizes
This paper addresses the design of control policies for groups of up to 16 simple autonomous mobile robots (called s-bots) for the cooperative transport of heavy objects of differe...
Roderich Groß, Marco Dorigo
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 8 months ago
Improving Web Performance through New Networking Technologies
New connection-oriented networking technologies can provide quality-of-service guaranteed network connectivity required by some web-based applications. In this paper, we present a...
Xiuduan Fang, Xuan Zheng, Malathi Veeraraghavan
AINTEC
2006
Springer
15 years 8 months ago
A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks
AOMP (Ad-hoc Overlay Multicast Protocol) is a novel approach for application-layer multicast in ad-hoc networks. We introduce in this paper a new algorithm that exploits a few prop...
Mohamed Ali Kâafar, Cyrine Mrabet, Thierry T...
153
Voted
CAISE
2004
Springer
15 years 8 months ago
Enhancing Application Interoperability and Enabling B2B Transactions over the Internet for Small and Medium Enterprises: The PRA
Abstract. The paper presents an approach towards executing transactions between enterprises, governmental bodies and banking institutions, based on ERP applications connected over ...
Yannis Charalabidis, Stelios Pantelopoulos
« Prev « First page 1102 / 1438 Last » Next »