Sciweavers

2265 search results - page 192 / 453
» Recovering Exchanged Data
Sort
View
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 9 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
KIVS
2005
Springer
15 years 9 months ago
Epidemic Dissemination of Presence Information in Mobile Instant Messaging Systems
This paper presents an approach for exchanging presence information between users of an instant messaging system in a mobile ad hoc network. As major feature, presence information ...
Christoph Lindemann, Oliver P. Waldhorst
HICSS
2002
IEEE
100views Biometrics» more  HICSS 2002»
15 years 9 months ago
XML-Based Supply Chain Management--As SIMPLEX as It Is
In this paper we want to examine, to what extent XML is able to support the exchange of business documents in supply chains. Thereby we focus on the problem of converting differen...
Peter Buxmann, Luis Martín Díaz, Eri...
CDC
2009
IEEE
211views Control Systems» more  CDC 2009»
15 years 8 months ago
An event-triggered distributed primal-dual algorithm for Network Utility maximization
Abstract— Many problems associated with networked systems can be formulated as network utility maximization (NUM) problems. NUM problems maximize a global separable measure of ne...
Pu Wan, Michael D. Lemmon
163
Voted
WSC
2008
15 years 6 months ago
Service-Oriented-Architecture based framework for multi-user virtual environments
Service-Oriented Architecture (SOA) is an application framework used for creating complex enterprise systems by integrating distributed services. The SOA standards are primarily f...
Xiaoyu Zhang, Denis Gracanin