Sciweavers

1363 search results - page 147 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
14 years 11 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
DC
2008
14 years 11 months ago
Sketching asynchronous data streams over sliding windows
We study the problem of maintaining a sketch of recent elements of a data stream. Motivated by applications involving network data, we consider streams that are asynchronous, in wh...
Bojian Xu, Srikanta Tirthapura, Costas Busch
ISI
2008
Springer
14 years 11 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
CN
1998
78views more  CN 1998»
14 years 11 months ago
Twenty-One: Cross-Language Disclosure and Retrieval of Multimedia Documents on Sustainable Development
The Twenty-One project brings together environmental organisations, technology providers and research institutes from several European countries. The main objective of the project...
Wilco G. ter Stal, J.-H. Beijert, G. de Bruin, J. ...
AI
1999
Springer
14 years 11 months ago
Experiences with an Interactive Museum Tour-Guide Robot
This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular, distributed software architecture, which integrates localiz...
Wolfram Burgard, Armin B. Cremers, Dieter Fox, Dir...