Sciweavers

1788 search results - page 349 / 358
» Integrating Security into the Curriculum
Sort
View
DRM
2004
Springer
15 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
89
Voted
ER
2004
Springer
169views Database» more  ER 2004»
15 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
15 years 2 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
OOPSLA
2004
Springer
15 years 2 months ago
AJEER: an aspectJ-enabled eclipse runtime
There are a number of technologies designed to improve modularity in software systems. The technique presented here combines two of them seamlessly to exploit their respective ben...
Martin Lippert
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
15 years 2 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu