Sciweavers

1307 search results - page 195 / 262
» Follow the intellectual property
Sort
View
WINET
2010
199views more  WINET 2010»
14 years 8 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
FSTTCS
2010
Springer
14 years 7 months ago
Combinatorial Problems with Discounted Price Functions in Multi-agent Systems
ABSTRACT. Motivated by economic thought, a recent research agenda has suggested the algorithmic study of combinatorial optimization problems under functions which satisfy the prope...
Gagan Goel, Pushkar Tripathi, Lei Wang
ICOODB
2010
171views Database» more  ICOODB 2010»
14 years 7 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...
REFSQ
2010
Springer
14 years 7 months ago
Towards a Framework for Specifying Software Robustness Requirements Based on Patterns
Abstract. [Context and motivation] With increasing use of software, quality attributes grow in relative importance. Robustness is a software quality attribute that has not received...
Ali Shahrokni, Robert Feldt
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 7 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer