Sciweavers

977 search results - page 139 / 196
» Soft Constraints for Security
Sort
View
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 4 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ICSE
2007
IEEE-ACM
15 years 4 months ago
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs
This paper outlines our experiences with making architectural tradeoffs between performance, availability, security, and usability, in light of stringent cost and time-to-market c...
T. C. Nicholas Graham, Rick Kazman, Chris Walmsley
IADIS
2004
14 years 11 months ago
Physiology of mobile database: an unconventional database
As the mobility of people increases, anytime, anywhere computing has become a must. The appearance of powerful portable computers, along with advancement in wireless communication...
Imran Khan, Nasir Touheed
IMSA
2001
121views Multimedia» more  IMSA 2001»
14 years 11 months ago
Technology Integrated Learning Environment - A Web-based Distance Learning System
This paper analyses the requirements of a third-generation technology integrated learning environment. The architecture proposed is analysed in terms of the generic constraints of...
Regina Gehne, Chris R. Jesshope, Zhenzi Zhang
IJCAI
2003
14 years 11 months ago
Keys, Nominals, and Concrete Domains
Many description logics (DLs) combine knowledge tation on an abstract, logical level with an interface to “concrete” domains such as numbers and strings. We propose to extend ...
Carsten Lutz, Carlos Areces, Ian Horrocks, Ulrike ...