Sciweavers

10210 search results - page 277 / 2042
» Configuring Database Systems
Sort
View
ACSAC
2010
IEEE
15 years 1 months ago
Exploring usability effects of increasing security in click-based graphical passwords
Graphical passwords have been proposed to address known problems with traditional text passwords. For example, memorable user-chosen text passwords are predictable, but random sys...
Elizabeth Stobert, Alain Forget, Sonia Chiasson, P...
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
14 years 10 months ago
Dynamic reconfiguration of terminal airspace during convective weather
Dynamic airspace configuration (DAC) algorithms strive to restructure the U.S. National Airspace System (NAS) in ways that allow air traffic control to better manage aircraft flows...
Diana Michalek, Hamsa Balakrishnan
VLDB
1994
ACM
114views Database» more  VLDB 1994»
15 years 7 months ago
Relating Distributed Objects
Many relational and object-oriented database systems provide referential integrity and compound operations on related objects using relationship mechanisms. Distributed object sys...
Bruce E. Martin, R. G. G. Cattell
GIS
2009
ACM
16 years 4 months ago
A Parallel Plane Sweep Algorithm for Multi-Core Systems
A parallel version of the plane sweep algorithm targeted towards the small number of processing cores available on commonly available multi-core systems is presented. Experimental...
Mark McKenney, Tynan McGuire
IJNSEC
2008
81views more  IJNSEC 2008»
15 years 3 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh