Sciweavers

1456 search results - page 123 / 292
» Keeping encountered information
Sort
View
RECOSOC
2007
116views Hardware» more  RECOSOC 2007»
15 years 3 months ago
IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. I...
Eduardo Wanderley Netto, Reouven Elbaz, Lionel Tor...
ECIS
2004
15 years 3 months ago
Legal issues of personalized e-commerce applications
Most e-commerce applications require the collection and storing of information about customers. As a consequence, the performed transactions involve legal issues. For two years, t...
Petra Schubert, Mathias Kummer, Uwe Leimstoll
108
Voted
DMDW
2001
100views Management» more  DMDW 2001»
15 years 3 months ago
Understanding Analysis Dimensions in a Multidimensional Object-Oriented Model
OLAP defines a set of data warehousing query tools characterized by providing a multidimensional view of data. Information can be shown at different aggregation levels (often call...
Alberto Abelló, José Samos, Fè...
USENIX
2001
15 years 3 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson
101
Voted
WSCG
2004
158views more  WSCG 2004»
15 years 3 months ago
Robot Hand Visual Tracking Using an Adaptive Fuzzy Logic Controller
This paper presents an algorithm to track an industrial robot hand during its movement. Based on acquired image and knowing the robot hand model, the pose is obtained. This inform...
Carlos Pérez, Óscar Reinoso, Maria A...