Sciweavers

3771 search results - page 211 / 755
» Subobject Transformation Systems
Sort
View
IWIA
2005
IEEE
15 years 9 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
15 years 9 months ago
Sensor Fusion and Complex Data Analysis for Predictive Maintenance
An essential step toward the development of an intelligent substation is to provide self-diagnosing capability at the equipment level. Transformers, circuit breakers and other sub...
Rahmat Shoureshi, Tim Norick, David Linder, John W...
ECAI
2000
Springer
15 years 8 months ago
Autonomous Environment and Task Adaptation for Robotic Agents
This paper investigates the problem of improving the performance of general state-of-the-art robot control systems by autonomously adapting them to specific tasks and environments...
Michael Beetz, Thorsten Belker
CRYPTO
1991
Springer
144views Cryptology» more  CRYPTO 1991»
15 years 7 months ago
Interactive Proofs with Space Bounded Provers
Recent results in interactive proof systems [?][?] [?] seem to indicate that it is easier for a prover in a single prover interactive proof system to cheat the verifier than it i...
Joe Kilian, Ronitt Rubinfeld
IASTEDSEA
2004
15 years 5 months ago
Instance orientation: A programming methodology
Instance orientation is an approach for designing and programming software systems. It addresses a limitation of current software architectures: it allows multiple higherlevel vie...
Thomas Schöbel-Theuer