Sciweavers

2429 search results - page 329 / 486
» Using Aspects to Design a Secure System
Sort
View
CSREASAM
2007
14 years 11 months ago
A PDA Implementation of an Off-line e-Cash Protocol
— We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance betw...
Efrén Clemente-Cuervo, Francisco Rodr&iacut...
IASTEDSEA
2004
14 years 11 months ago
An object oriented approach to an identity based encryption cryptosystem
We describe an object oriented approach to developing an Identity Based Encryption system. We show how an existing API was reused and extended to facilitate our development of the...
Adam Duffy, Tom Dowling
EKAW
2004
Springer
15 years 3 months ago
ConEditor: Tool to Input and Maintain Constraints
We present a tool which helps domain experts capture and maintain constraints. The tool displays parts of an ontology (as classes, sub-classes and properties) in the form of a tree...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
ICSOC
2007
Springer
15 years 4 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 4 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...