Sciweavers

1156 search results - page 60 / 232
» Implications for design
Sort
View
ACSW
2007
15 years 18 days ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
ICCS
2009
Springer
15 years 5 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
DATE
1999
IEEE
129views Hardware» more  DATE 1999»
15 years 3 months ago
Battery-Powered Digital CMOS Design
In this paper, we consider the problem of maximizing the battery life (or duration of service) in battery-powered CMOS circuits. We first show that the battery efficiency (or utili...
Massoud Pedram, Qing Wu
ACMDIS
2004
ACM
15 years 4 months ago
Recycled soundscapes
The distinctive features of interactive sound installations in public space are considered, with special attention to the rich, if undoubtedly difficult, environments in which the...
Karmen Franinovic, Yon Visell
VLDB
2004
ACM
102views Database» more  VLDB 2004»
15 years 4 months ago
PIVOT and UNPIVOT: Optimization and Execution Strategies in an RDBMS
PIVOT and UNPIVOT, two operators on tabular data that exchange rows and columns, enable data transformations useful in data modeling, data analysis, and data presentation. They ca...
Conor Cunningham, Goetz Graefe, César A. Ga...