Sciweavers

13004 search results - page 2513 / 2601
» Mining Software Data
Sort
View
164
Voted
TES
2001
Springer
15 years 7 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
121
Voted
MSS
2000
IEEE
72views Hardware» more  MSS 2000»
15 years 7 months ago
The InTENsity PowerWall: A Case Study for a Shared File System Testing Framework
The InTENsity PowerWall is a display system used for high-resolution visualization of very large volumetric data sets. The display is linked to two separate computing environments...
Alex W. Elder, Thomas Ruwart, Benjamin D. Allen, A...
SIGCSE
2000
ACM
132views Education» more  SIGCSE 2000»
15 years 7 months ago
Empirical investigation throughout the CS curriculum
Empirical skills are playing an increasingly important role in the computing profession and our society. But while traditional computer science curricula are effective in teaching...
David W. Reed, Craig S. Miller, Grant Braught
146
Voted
MSS
1999
IEEE
150views Hardware» more  MSS 1999»
15 years 7 months ago
Performance Benchmark Results for Automated Tape Library High Retrieval Rate Applications - Digital Check Image Retrievals
Benchmark tests have been designed and conducted for the purpose of evaluating the use of automated tape libraries in on-line digital check image retrieval applications. This type...
John Gniewek, George Davidson, Bowen Caldwell
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 7 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
« Prev « First page 2513 / 2601 Last » Next »