Sciweavers

2454 search results - page 324 / 491
» Privacy in the Information and Communications Technologies
Sort
View
COOPIS
2004
IEEE
15 years 5 months ago
Cooperative Artefacts
In this position paper we introduce Cooperative Artefacts, physical objects that embed sensing, communication, computation and actuation in physical objects. In contrast to many ot...
Hans-Werner Gellersen
ISW
2000
Springer
15 years 5 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
DAWAK
2008
Springer
15 years 3 months ago
Summarizing Distributed Data Streams for Storage in Data Warehouses
Data warehouses are increasingly supplied with data produced by a large number of distributed sensors in many applications: medicine, military, road traffic, weather forecast, util...
Raja Chiky, Georges Hébrail
INFOSCALE
2007
ACM
15 years 3 months ago
Ontology driven adaptive data processing in wireless sensor networks
It is important to provide adaptive data processing in wireless sensor networks in order to deal with various applications. In this paper,we propose a WIreless Sensor Networks Ont...
Yuheng Hu, Zhendong Wu, Ming Guo
CVHI
2007
15 years 3 months ago
E-voting - a Key to Independence for All
: The paper addresses the experience of Estonia in strengthening democracy through the use of information and communication technologies (ICT) to bring decision-making closer to th...
Erik Loide, Ülle Lepp