Sciweavers

4385 search results - page 812 / 877
» Abstraction for Concurrent Objects
Sort
View
104
Voted
JCM
2007
101views more  JCM 2007»
15 years 14 days ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
104
Voted
CSCW
2004
ACM
15 years 13 days ago
Small-Scale Classification Schemes: A Field Study of Requirements Engineering
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handlin...
Morten Hertzum
DATAMINE
2000
118views more  DATAMINE 2000»
15 years 12 days ago
Spatial Data Mining: Database Primitives, Algorithms and Efficient DBMS Support
Abstract: Spatial data mining algorithms heavily depend on the efficient processing of neighborhood relations since the neighbors of many objects have to be investigated in a singl...
Martin Ester, Alexander Frommelt, Hans-Peter Krieg...
125
Voted
COMPUTER
2002
121views more  COMPUTER 2002»
15 years 12 days ago
The Interspace: Concept Navigation Across Distributed Communities
ectly support interaction with abstraction. Using technologies that go beyond searching individual repositories to analyzing and correlating knowledge across multiple sources and s...
Bruce R. Schatz
JOC
2000
181views more  JOC 2000»
15 years 11 days ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern