Sciweavers

2250 search results - page 152 / 450
» Authorizing applications in singularity
Sort
View
84
Voted
ICCSA
2005
Springer
15 years 3 months ago
Mobile Mini-payment Scheme Using SMS-Credit
Mobile Phone has been widely used in the world and adopted in different application areas involved with SMS has been evolved for downloading logo, ring-tones, advertisement, secur...
Simon Fong, Edison Lai
AVI
2004
14 years 11 months ago
A graph-based interface to complex hypermedia structure visualization
Complex hypermedia structures can be difficult to author and maintain, especially when the usual hierarchic representation cannot capture important relations. We propose a graph-b...
Manuel Freire, Pilar Rodríguez
96
Voted
ENTCS
2007
140views more  ENTCS 2007»
14 years 10 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
IVS
2002
106views more  IVS 2002»
14 years 9 months ago
Pixel bar charts: a visualization technique for very large multi-attribute data sets?
Simple presentation graphics are intuitive and easy-to-use, but show only highly aggregated data presenting only a very small number of data values (as in the case of bar charts) ...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal, Meich...
DOCENG
2010
ACM
14 years 8 months ago
From templates to schemas: bridging the gap between free editing and safe data processing
In this paper we present tools that provide an easy way to edit XML content directly on the web, with the usual benefit of valid XML content. These tools make it possible to crea...
Vincent Quint, Cécile Roisin, Stépha...