Sciweavers

469 search results - page 60 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
SMI
1999
IEEE
108views Image Analysis» more  SMI 1999»
15 years 4 months ago
Modeling of Surfaces with Fair Reflection Line Pattern
Inspection of reflection line patterns is a standard way to check the quality of free form surfaces. In this paper, we describe an approach which enables the designer to control d...
Joachim Loos, Günther Greiner, Hans-Peter Sei...
ATAL
2006
Springer
15 years 1 months ago
Autonomous agents for air-traffic deconfliction
This contribution presents a deployment exercise of multiagent technology in the domain of deconflicted air-traffic control among several autonomous aerial vehicles (manned as wel...
Michal Pechoucek, David Sislák, Dusan Pavl&...
IQ
2001
15 years 1 months ago
Information Envelope and its Information Integrity Implications
: Physical and informational works are strongly interrelated in a business process. This facilitates modeling a business process as an integral part of a closed loop information an...
Vijay V. Mandke, Madhavan K. Nayar, Kamna Malik
VTC
2010
IEEE
162views Communications» more  VTC 2010»
14 years 10 months ago
Cognitive Radio Enabled Multi-Channel Access for Vehicular Communications
—The IEEE 1609.4 standard has been proposed to provide multi-channel operations in wireless access for vehicular environments (WAVE), where all the channels are periodically sync...
Jui-Hung Chu, Kai-Ten Feng, Chen-Nee Chuah, Chin-F...
SACMAT
2011
ACM
14 years 2 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...