Sciweavers

341 search results - page 52 / 69
» Entity Modeling in the MLS Relational Model
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ICYCS
2008
IEEE
15 years 4 months ago
Trustworthiness and Quality of Context Information
Context-aware service platforms use context information to customize their services to the current users’ situation. Due to technical limitations in sensors and context reasonin...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
ISEMANTICS
2010
14 years 8 months ago
Towards an approach for formalizing the supply chain operations
Reference models play an important role in the knowledge management of the various complex collaboration domains (such as Supply Chain Networks). However, they often show a lack o...
Milan Zdravkovic, Hervé Panetto, Miroslav T...
JLP
2008
121views more  JLP 2008»
14 years 8 months ago
A process algebraic view of shared dataspace coordination
Coordination languages were introduced in the early 80's as programming notations to manage the interaction among concurrent collaborating software entities. Process algebras...
Nadia Busi, Gianluigi Zavattaro
ASM
2008
ASM
14 years 11 months ago
A First Attempt to Express KAOS Refinement Patterns with Event B
anguage (Event B), hence staying at the same abstraction level. Thus we take advantage from the Event B method: (i) it is possible to use the method during the whole development pr...
Abderrahman Matoussi, Frédéric Gerva...