Now showing items 1-10 of 596
Enabling Data Markets Using Smart Contracts and Multi-party Computation
(Lecture Notes in Business Information Processing;339, Chapter, 2018)
With the emergence of data markets, data have become an asset that is used as part of transactions. Current data markets rely on trusted third parties to manage the data, creating single points of failure with possibly ...
Norwegian Passive House standard for non-residential buildings is less ambitious than previous criteria and completed projects
(Chapter; Conference object; Peer reviewed, 2015)
Stereographic projection for industrial manipulator tasks: Theory and experiments
In this paper, we present a solution and experimental results for real-time control of manipulation tasks considering the alignment of a robots end effector relative to some reference. The developed controller is applicable ...
Learning Privacy Preferences
This paper suggests a machine learning approach to preference generation in the context of privacy agents. With this solution, users are relieved from the complex task of specifying their preferences beforehand, disconnected ...
Modeling and Validating Dynamic Adaptation
This paper discusses preliminary work on modeling and validation dynamic adaptation. The proposed approach is on the use of aspect-oriented modeling (AOM) and models at runtime. Our approach covers design and runtime phases. ...
A survey on security in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) has for several years been viewed as a promising technology for several application areas where fixed infrastructure is either unreliable or non-existent. Although the technology has been ...
Towards a Simple Augmented Reality Museum Guide
A Lightweight Approach to Secure Software Engineering
Secure software engineering is much more than developing critical software. History has shown us that software bugs and design flaws also represent exploitable security vulnerabilities in seemingly innocuous applications ...
Learning From Software Security Testing
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be ``if to test'' for security, but rather ``where and when to test'' and ``then what?''. In this paper we present ...
BatCave: Adding Security to the BATMAN Protocol
The Better Approach To Mobile Ad-hoc Networking (BATMAN) protocol is intended as a replacement for protocols such as OLSR, but just like most such efforts, BATMAN has no built-in security features. In this paper we describe ...