Sciweavers

10284 search results - page 1941 / 2057
» Designing for nomadic work
Sort
View
111
Voted
ACSAC
2002
IEEE
15 years 5 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
119
Voted
COOPIS
2002
IEEE
15 years 5 months ago
View Propagation and Inconsistency Detection for Cooperative Mobile Agents
Mobile agents are autonomous programs that migrate from one machine to another within a network on behalf of a client, thus, they are ideal for mobile computing environments since ...
Susan Weissman Lauzac, Panos K. Chrysanthis
97
Voted
FCCM
2002
IEEE
126views VLSI» more  FCCM 2002»
15 years 5 months ago
Hyperspectral Image Compression on Reconfigurable Platforms
NASA’s satellites currently do not make use of advanced image compression techniques during data transmission to earth because of limitations in the available platforms. With th...
Thomas W. Fry, Scott Hauck
90
Voted
HICSS
2002
IEEE
119views Biometrics» more  HICSS 2002»
15 years 5 months ago
A New Buffer Management Scheme for Multimedia Terminals in Broadband Satellite Networks
In the recent years, there has been a growing interest in broadband satellite networks. Broadband satellite networks are designed to provide the required qualify of service (QoS) ...
Mahnoosh Mobasseri, Victor C. M. Leung
89
Voted
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
15 years 5 months ago
The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role
: This research note both confirms and extends the value relevance of information technology announcements found by Im et al (2001) and Dos Santos et al. (1993). We extend their wo...
Vernon J. Richardson, Robert W. Zmud
« Prev « First page 1941 / 2057 Last » Next »