Sciweavers

1658 search results - page 220 / 332
» Implementing Bit-addressing with Specialization
Sort
View
IUI
2003
ACM
15 years 5 months ago
Towards individual service provisioning
With the emergence of modularized componentbased electronic services, such as Web Services and semantically tagged services, Individual Service Provisioning, wherein any user can ...
Fredrik Espinoza
SACMAT
2003
ACM
15 years 5 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
101
Voted
CHES
2003
Springer
119views Cryptology» more  CHES 2003»
15 years 5 months ago
Faster Double-Size Modular Multiplication from Euclidean Multipliers
Abstract. A novel technique for computing a 2n-bit modular multiplication using n-bit arithmetic was introduced at CHES 2002 by Fischer and Seifert. Their technique makes use of an...
Benoît Chevallier-Mames, Marc Joye, Pascal P...
104
Voted
CIA
2003
Springer
15 years 5 months ago
Send Fredo off to Do This, Send Fredo off to Do That
Abstract. Fredo is a generic domain-independent broker that creates valueadded information taking into account the preferences specified by its clients. Fredo uses ontology service...
Luís Miguel Botelho, Hugo Mendes, Pedro Fig...
104
Voted
ERCIMDL
2003
Springer
124views Education» more  ERCIMDL 2003»
15 years 5 months ago
A Digital GeoLibrary: Integrating Keywords and Place Names
A digital library typically includes a set of keywords (or subject terms) for each document in its collection(s). For some applications, including natural resource management, geog...
Mathew Weaver, Lois M. L. Delcambre, Leonard D. Sh...