Sciweavers

6836 search results - page 1258 / 1368
» Modelling Web-Oriented Architectures
Sort
View
ACSW
2003
14 years 11 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
ECIS
2001
14 years 11 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
CIDR
2003
123views Algorithms» more  CIDR 2003»
14 years 11 months ago
A Case for Staged Database Systems
Traditional database system architectures face a rapidly evolving operating environment, where millions of users store and access terabytes of data. In order to cope with increasi...
Stavros Harizopoulos, Anastassia Ailamaki
FLAIRS
2001
14 years 11 months ago
An Intelligent Interface for Keyboard and Mouse Control -- Providing Full Access to PC Functionality via Speech
SUITEKeys is a speech user interface for motor-disabled computer users. This interface provides access to all available functionality of a computer by modeling interaction at the ...
Bill Z. Manaris, Renée A. McCauley, Valanne...
IKE
2004
14 years 11 months ago
A Knowledge-Based Framework for Deploying Surveillance Problem Solvers
Increased concern about bioterrorism and emerging diseases is driving the development of systems for early epidemic detection. These systems have different requirements than tradit...
David L. Buckeridge, Martin J. O'Connor, Haobo Xu,...
« Prev « First page 1258 / 1368 Last » Next »