Sciweavers

3274 search results - page 598 / 655
» Access Support in Object Bases
Sort
View
107
Voted
CORR
2007
Springer
170views Education» more  CORR 2007»
14 years 12 months ago
Animation of virtual mannequins, robot-like simulation or motion captures
— In order to optimize the costs and time of design of the new products while improving their quality, concurrent engineering is based on the digital model of these products, the...
Damien Chablat
JNW
2008
83views more  JNW 2008»
14 years 12 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
IMCS
2007
77views more  IMCS 2007»
14 years 11 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
TKDE
2008
122views more  TKDE 2008»
14 years 11 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
102
Voted
VTC
2010
IEEE
207views Communications» more  VTC 2010»
14 years 10 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...