Sciweavers

IEEECIT
2010
IEEE
13 years 5 months ago
Efficient Sharing of Secure Cloud Storage Services
Suppose Bob, the boss in Company A, pays a secure cloud storage service and authorizes all the employees in that company to share such a service. There exists a user hierarchy: Bob...
Qin Liu, Guojun Wang, Jie Wu
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 5 months ago
Refinement and Verification of Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and ...
Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmere...
ERSA
2006
82views Hardware» more  ERSA 2006»
13 years 8 months ago
Cache Architectures for Reconfigurable Hardware
The architecture and use of caches for two-level reconfigurable hardware is studied in this paper. The considered two-level reconfigurable hardware performs ordinary reconfiguratio...
Sebastian Lange, Martin Middendorf
MEDINFO
2007
112views Healthcare» more  MEDINFO 2007»
13 years 8 months ago
SNOMED CT's Problem List: Ontologists' and Logicians' Therapy Suggestions
After a critical review of the present architecture of SNOMED CT, addressing both logical and ontological issues, we present a roadmap towards an overall improvement of this termi...
Stefan Schulz, Boontawee Suntisrivaraporn, Franz B...
FASE
2000
Springer
13 years 10 months ago
Parallel Refinement Mechanisms for Real-Time Systems
This paper discusses highly general mechanisms for specifying the refinement of a real-time system as a collection of lower level parallel components that preserve the timing and f...
Paul Z. Kolano, Richard A. Kemmerer, Dino Mandriol...
IAT
2003
IEEE
14 years 12 days ago
A Two-Level Negotiation Framework for Complex Negotiations
In this paper, we present a negotiation framework in which the negotiation process is performed at two levels. The upper level deals with the formation of high-level goals and obj...
Xiaoqin Zhang, Victor R. Lesser, Thomas Wagner
HICSS
2005
IEEE
131views Biometrics» more  HICSS 2005»
14 years 22 days ago
Train Traffic Deviation Handling Using Tabu Search and Simulated Annealing
This paper addresses the problem of solving conflicts in railway traffic that arise due to disturbances. It is formulated as a problem of re-scheduling meets and overtakes of trai...
Johanna Törnquist, Jan A. Persson