Sciweavers

12493 search results - page 2272 / 2499
» Information Access in the Web
Sort
View
110
Voted
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
15 years 3 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
CSCW
2008
ACM
15 years 3 months ago
Family accounts: a new paradigm for user accounts within the home environment
In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at hom...
Serge Egelman, A. J. Bernheim Brush, Kori M. Inkpe...
DAMON
2008
Springer
15 years 3 months ago
Fast scans and joins using flash drives
As access times to main memory and disks continue to diverge, faster non-volatile storage technologies become more attractive for speeding up data analysis applications. NAND flas...
Mehul A. Shah, Stavros Harizopoulos, Janet L. Wien...
117
Voted
ECAI
2008
Springer
15 years 3 months ago
A Practical Temporal Constraint Management System for Real-Time Applications
A temporal constraint management system (TCMS) is a temporal network together with algorithms for managing the constraints in that network over time. This paper presents a practica...
Luke Hunsberger
ER
2008
Springer
136views Database» more  ER 2008»
15 years 3 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
« Prev « First page 2272 / 2499 Last » Next »