Sciweavers

24188 search results - page 392 / 4838
» Computing on Encrypted Data
Sort
View
DEXAW
1995
IEEE
93views Database» more  DEXAW 1995»
15 years 8 months ago
Meta Modeling for End User Computing
Inherent constraints play an important role in the semantic Xplain model. These constraints enable us to represent certain real world knowledge once for subsequent use in several ...
J. H. ter Bekke
WSCG
2004
117views more  WSCG 2004»
15 years 6 months ago
A Supply-Chain for Computer-Mediated Communication and Visualization
The paper specifies modular software for synchronous and asynchronous computer-mediated communication and visualization in network-distributed environments. It is new because the ...
Nils Jensen, Ralf Einhorn, Gabriele von Voigt
WCE
2007
15 years 6 months ago
Performance Modelling of the Computational Hardware: A Statistical Approach
—This paper proposes and uses multivariate methods as a tool to evaluate performances of the hardware of microcomputers using their performance data, speed and price. The evaluat...
Ibrahim Akman, Yasar Yesilcay
JDFP
2008
81views more  JDFP 2008»
15 years 4 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
ISCI
2008
67views more  ISCI 2008»
15 years 4 months ago
A multiview approach for intelligent data analysis based on data operators
Multiview intelligent data analysis explores data from different perspectives to reveal various types of structures and knowledge embedded in the data. Each view may capture a spe...
Yaohua Chen, Yiyu Yao