Sciweavers

327 search results - page 48 / 66
» A Framework for Institutions Governing Institutions
Sort
View
101
Voted
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
15 years 2 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
DGO
2003
133views Education» more  DGO 2003»
15 years 1 months ago
Accessing Diverse Geo-Referenced Data Sources with the SAND Spatial DBMS
The Internet has become the most frequently accessed medium for obtaining various types of data. In particular, government agencies, academic institutions, and private enterprises...
Jagan Sankaranarayanan, Egemen Tanin, Hanan Samet,...
JAMIA
2011
94views more  JAMIA 2011»
14 years 7 months ago
Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an
The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practi...
Kenneth W. Goodman, Eta S. Berner, Mark A. Dente, ...
78
Voted
SIGCSE
2009
ACM
94views Education» more  SIGCSE 2009»
16 years 1 months ago
CS1 students speak: advice for students by students
We collected advice on how to succeed at learning to program from 164 CS1 students at 3 institutions during a "saying is believing"intervention designed to encourage a g...
Beth Simon, Brian Hanks, Carol Zander, Laurie Murp...
CHI
2008
ACM
16 years 25 days ago
Asynchronous remote medical consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Rowena Luk, Melissa Ho, Paul M. Aoki