Sciweavers

836 search results - page 65 / 168
» A Model for Data Warehouse Operational Processes
Sort
View
120
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 7 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
163
Voted
JDCTA
2010
161views more  JDCTA 2010»
14 years 10 months ago
Selection of Wavelet Decomposition Level in Multi-Scale Sensor Data Fusion of MEMS Gyroscope
Because the characteristic of wavelet transform is multi-resolution, their unique advantage of the data model is multi-scale analysis. Then, it's widely used the Wavelet-base...
Ren Ya-fei, Ke Xi-zheng
138
Voted
SAFECOMP
1998
Springer
15 years 7 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
119
Voted
ACISP
2000
Springer
15 years 8 months ago
High Performance Agile Crypto Modules
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
132
Voted
DATESO
2007
113views Database» more  DATESO 2007»
15 years 5 months ago
Using XSEM for Modeling XML Interfaces of Services in SOA
In this paper we briefly describe a new conceptual model for XML data called XSEM and how to use it for modeling XML interfaces of services in service oriented architecture (SOA)....
Martin Necasky