Sciweavers

1363 search results - page 147 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
124
Voted
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 3 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
DC
2008
15 years 3 months ago
Sketching asynchronous data streams over sliding windows
We study the problem of maintaining a sketch of recent elements of a data stream. Motivated by applications involving network data, we consider streams that are asynchronous, in wh...
Bojian Xu, Srikanta Tirthapura, Costas Busch
ISI
2008
Springer
15 years 3 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
135
Voted
CN
1998
78views more  CN 1998»
15 years 3 months ago
Twenty-One: Cross-Language Disclosure and Retrieval of Multimedia Documents on Sustainable Development
The Twenty-One project brings together environmental organisations, technology providers and research institutes from several European countries. The main objective of the project...
Wilco G. ter Stal, J.-H. Beijert, G. de Bruin, J. ...
AI
1999
Springer
15 years 3 months ago
Experiences with an Interactive Museum Tour-Guide Robot
This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular, distributed software architecture, which integrates localiz...
Wolfram Burgard, Armin B. Cremers, Dieter Fox, Dir...