Sciweavers

213 search results - page 32 / 43
» Some Considerations on Openness of Design Information
Sort
View
96
Voted
CCS
2008
ACM
14 years 11 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
GROUP
2009
ACM
15 years 2 months ago
Probing the potential of non-verbal group communication
Designing for non-verbal communication using e.g. gestures and other bodily expressions is difficult. Hardware and software need to be co-designed and harmonize in order to not th...
Petra Sundström, Tove Jaensson, Kristina H&ou...
SIGSOFT
2009
ACM
15 years 4 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...
CAD
2000
Springer
14 years 9 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
MOBIHOC
2003
ACM
15 years 9 months ago
Energy-efficient caching strategies in ad hoc wireless networks
In this paper, we address the problem of energy-conscious cache placement in wireless ad hoc networks. We consider a network comprising a server with an interface to the wired net...
Pavan Nuggehalli, Vikram Srinivasan, Carla-Fabiana...