Sciweavers

4678 search results - page 50 / 936
» Integrated University Information Systems
Sort
View
80
Voted
IH
1998
Springer
15 years 3 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
69
Voted
ITICSE
2005
ACM
15 years 5 months ago
Providing students universal access to a centralized, graphical computing environment
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Michael H. Goldwasser, David Letscher
89
Voted
OZCHI
2006
ACM
15 years 5 months ago
Mobile helper for university students: a design for a mobile learning environment
This paper reports on a design case study for a mobile learning (M-learning) environment that follows a usercentred design approach. This development of the system applied an M-le...
Richard Brown, Hokyoung Ryu, David Parsons
89
Voted
CBMS
2006
IEEE
15 years 5 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...