Sciweavers

1307 search results - page 184 / 262
» Follow the intellectual property
Sort
View
CMS
2006
14 years 11 months ago
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
Julien Bringer, Hervé Chabanne, Emmanuelle ...
DBSEC
2006
124views Database» more  DBSEC 2006»
14 years 11 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
GEOINFO
2003
14 years 11 months ago
Integrating Telecom Outside Plant Systems through the GML Standard
This paper introduces the Telecommunication Outside Plant Markup Language (TOPML), an OpenGis GML (Geographic Markup Language) application schema designed to describe telecommunica...
Gerson Mizuta Weiss
OPODIS
2004
14 years 11 months ago
Fast Localized Delaunay Triangulation
A localized Delaunay triangulation owns the following interesting properties in a wireless ad hoc setting: it can be built with localized information, the communication cost impos...
Filipe Araújo, Luís Rodrigues
OMER
2001
14 years 11 months ago
Towards Service-Based Flexible Production Control Systems and their Modular Modeling and Simulation
Abstract: Modeling of modern production plants often requires that the system provides means to cope with frequent changes in topology and equipment and can easily be adapted to ne...
Holger Giese, Ulrich Nickel