Sciweavers

3077 search results - page 298 / 616
» Design Principles for Application Integration
Sort
View
127
Voted
CCS
2007
ACM
15 years 9 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ACMSE
2005
ACM
15 years 9 months ago
Towards a "humans-first" computer science curriculum
Traditionally, computer science education has considered “objects-first” or “imperative-first” approaches, with the focus of the course on teaching design of programs star...
D. Scott McCrickard, Charles J. Fowler, Christa M....
128
Voted
WPES
2004
ACM
15 years 9 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
128
Voted
IJCNN
2000
IEEE
15 years 8 months ago
Analog Hardware Implementation of the Random Neural Network Model
This paper presents a simple continuous analog hardware realization of the Random Neural Network (RNN) model. The proposed circuit uses the general principles resulting from the u...
Hossam Abdelbaki, Erol Gelenbe, Said E. El-Khamy
132
Voted
VRML
1999
ACM
15 years 7 months ago
An Open Virtual Environment for Autonomous Agents Using VRML and Java
We describe a VRML/Java-based virtual environment that is populated with heterogeneous articulated agents. In this simulated environment, agents compete for collecting certain obj...
Bernhard Jung, Jan-Torsten Milde