Sciweavers

3907 search results - page 710 / 782
» Information requirements engineering for data warehouse syst...
Sort
View
GLOBECOM
2008
IEEE
15 years 8 months ago
On Base Station Cooperation Schemes for Downlink Network MIMO under a Constrained Backhaul
— Next generation mobile comunications systems will most likely employ multi-cell cooperative signal processing schemes, often referred to as network MIMO, as these are known to ...
Patrick Marsch, Gerhard Fettweis
SECURWARE
2007
IEEE
15 years 8 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
CIKM
2007
Springer
15 years 8 months ago
Index compression is good, especially for random access
Index compression techniques are known to substantially decrease the storage requirements of a text retrieval system. As a side-effect, they may increase its retrieval performanc...
Stefan Büttcher, Charles L. A. Clarke
103
Voted
ACSAC
2005
IEEE
15 years 7 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICWE
2004
Springer
15 years 7 months ago
Personalizing Web Sites for Mobile Devices Using a Graphical User Interface
Despite recent advances in wireless and portable hardware technologies, mobile access to the Web is often laborious. For this reason, several solutions have been proposed to custom...
Leonardo Teixeira Passos, Marco Tulio de Oliveira ...