Sciweavers

448 search results - page 52 / 90
» k-anonymous message transmission
Sort
View
HICSS
2006
IEEE
165views Biometrics» more  HICSS 2006»
15 years 4 months ago
Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast
Secure multicast has a variety of applications in ecommerce, e-banking, command and control, video-ondemand, and other internet-based services. In this paper, we present algorithm...
Mohammad Hossain Heydari, Linda Morales, Ivan Hal ...
ICAS
2006
IEEE
145views Robotics» more  ICAS 2006»
15 years 4 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Grids
Service-oriented grids are grid computing systems built with the notion of service-oriented architecture (SOA). Using two maract concepts, services and connections between service...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
ROBIO
2006
IEEE
103views Robotics» more  ROBIO 2006»
15 years 4 months ago
Processing of an Embedded Tactile Matrix Sensor
— A fully embedded tactile/force sensor system to be installed on the phalanges of a robot hand is presented in this paper. The sensor consists of a distributed array of analog t...
Giorgio Cannata, Marco Maggiali
WECWIS
2006
IEEE
97views ECommerce» more  WECWIS 2006»
15 years 4 months ago
On State Synchronization of Business Conversations
The paper assumes that business interactions between trading partners are composed of well defined conversations (tasks), such as issue a purchase order, process payment, refund m...
Carlos Molina-Jiménez, Santosh K. Shrivasta...
SPW
2005
Springer
15 years 3 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong