Sciweavers

859 search results - page 170 / 172
» Security for Key Management Interfaces
Sort
View
GI
1997
Springer
15 years 5 months ago
Persistent Object Systems: From Technology to Market
Abstract. This text describes how persistent object system technology developed in European basic research is being used by a small German startup software company to realize innov...
Andreas Gawecki, Florian Matthes, Joachim W. Schmi...
MEDINFO
2007
177views Healthcare» more  MEDINFO 2007»
15 years 3 months ago
The Molecular Medicine Informatics Model (MMIM)
In 2005, a major collaboration in Melbourne Australia successfully completed implementing a major medical informatics infrastructure – this is now being used for discovery resear...
Marienne Hibbert, Peter Gibbs, Terence O'brien, Pe...
ODRL
2004
15 years 3 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
15 years 2 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...
111
Voted
GROUP
2007
ACM
15 years 5 months ago
Suitable notification intensity: the dynamic awareness system
Being aware of others' activities has played a vital role in the success of online collaboration. This resulted in the emergence of many groupware systems that provide users ...
Yao Wang, Wolfgang Gräther, Wolfgang Prinz