Sciweavers

3605 search results - page 656 / 721
» Analysis and Applications of the XDI model
Sort
View
NORDSEC
2009
Springer
15 years 3 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
WADS
2001
Springer
137views Algorithms» more  WADS 2001»
15 years 3 months ago
Visual Ranking of Link Structures
Methods for ranking World Wide Web resources according to their position in the link structure of the Web are receiving considerable attention, because they provide the first e...
Ulrik Brandes, Sabine Cornelsen
CSMR
1999
IEEE
15 years 3 months ago
Employing Use-cases and Domain Knowledge for Comprehending Resource Usage
Philips Electronics is a world wide electronics company that develops many products containing embedded software. These products range from shavers with only few hundred bytes of ...
René L. Krikhaar, Maarten Pennings, J. Zonn...
DAC
1996
ACM
15 years 3 months ago
A Sparse Image Method for BEM Capacitance Extraction
Boundary element methods (BEM) are often used for complex 3-D capacitance extraction because of their efficiency, ease of data preparation, and automatic handling of open regions. ...
Byron Krauter, Yu Xia, E. Aykut Dengi, Lawrence T....
ISCA
1993
IEEE
115views Hardware» more  ISCA 1993»
15 years 3 months ago
Parity Logging Overcoming the Small Write Problem in Redundant Disk Arrays
Parity encoded redundant disk arrays provide highly reliable, cost effective secondary storage with high performance for read accesses and large write accesses. Their performance ...
Daniel Stodolsky, Garth A. Gibson, Mark Holland