Sciweavers

1008 search results - page 179 / 202
» Motivations for social networking at work
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
TOG
2008
127views more  TOG 2008»
14 years 9 months ago
Freeform surfaces from single curved panels
Motivated by applications in architecture and manufacturing, we discuss the problem of covering a freeform surface by single curved panels. This leads to the new concept of semi-d...
Helmut Pottmann, Alexander Schiftner, Pengbo Bo, H...
IJWGS
2007
118views more  IJWGS 2007»
14 years 9 months ago
Grid middleware in China
: Grids aim at constructing a virtual single image of heterogeneous resources and provide uniform interface for distributed internet applications. China also devotes much passion a...
Yongwei Wu, Chunming Hu, Li Zha, Song Wu
CN
1999
69views more  CN 1999»
14 years 9 months ago
Transport of video over partial order connections
A Partial Order and partial reliable Connection (POC) is an end-to-end transport connection authorized to deliver objects in an order that can differ from the transmitted one. Such...
Luis Rojas-Cardenas, Emmanuel Chaput, Laurent Dair...
SCN
2010
Springer
147views Communications» more  SCN 2010»
14 years 8 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström