Sciweavers

3516 search results - page 437 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
PODC
2003
ACM
15 years 10 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
WETICE
1998
IEEE
15 years 9 months ago
Using Components for Modeling Intelligent and Collaborative Mobile Agents
Intelligence, collaboration and mobility are the main important features in designing agents for electronic commercial systems. But very few systems permit to implement agents whi...
Min-Jung Woo, Jean-Pierre Briot, Jacques Ferber
TOG
2002
123views more  TOG 2002»
15 years 4 months ago
A user interface for interactive cinematic shadow design
Placing shadows is difficult task since shadows depend on the relative positions of lights and objects in an unintuitive manner. To simplify the task of the modeler, we present a ...
Fabio Pellacini, Parag Tole, Donald P. Greenberg
ISARCS
2010
164views Hardware» more  ISARCS 2010»
15 years 6 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
DAI
1995
Springer
15 years 8 months ago
A Methodology for Developing Agent Based Systems
Potentially one of the most significant opportunities for enterprise integration is the recent development and advancement of agent based systems. However, before agents can be us...
Elizabeth A. Kendall, Margaret T. Malkoun, Chong H...