Sciweavers

825 search results - page 118 / 165
» Internal Iteration Externalized
Sort
View
ITIIS
2010
128views more  ITIIS 2010»
15 years 11 days ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
TRUST
2010
Springer
15 years 8 days ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
DLOG
2010
14 years 12 months ago
Towards Soundness Preserving Approximation for ABox Reasoning of OWL2
ABox Reasoning in large scale description logic (DL) knowledge bases, e.g. ontologies, is important for the success of many semantic-enriched systems. Performance of existing appro...
Yuan Ren, Jeff Z. Pan, Yuting Zhao
101
Voted
GI
2009
Springer
14 years 11 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson
177
Voted
EUROMED
2010
14 years 11 months ago
Assessing the Socio-economic Impact of 3D Visualisation in Cultural Heritage
Despite the multitude of impact measurement techniques available to heritage site managers there is a case for the bigger strategic picture to figure more strongly in impact measur...
Jaime Kaminski, Jim McLoughlin, Babak Sodagar