Sciweavers

22193 search results - page 4174 / 4439
» Multiple Restricted Multiplication
Sort
View
134
Voted
USENIX
2003
15 years 5 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
139
Voted
DARE
2000
125views more  DARE 2000»
15 years 5 months ago
Developing mixed reality boundaries
Our work in the field of mixed reality has been concerned with the development of the mixed reality boundary approach. In contrast to other approaches that focus on superimposing ...
Boriana Koleva, Holger Schnädelbach, Steve Be...
147
Voted
DBSEC
2000
138views Database» more  DBSEC 2000»
15 years 5 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
150
Voted
ECIS
2000
15 years 5 months ago
Community Health Assessments: A Data Warehousing Approach
- The measurement and assessment of health status in communities throughout the world is a massive information technology challenge. The Comprehensive Assessment for Tracking Commu...
Donald J. Berndt, Alan R. Hevner, James Studnicki
130
Voted
IWMMDBMS
1998
91views more  IWMMDBMS 1998»
15 years 5 months ago
Q-L/MRP: A Buffer Management Mechanism for QoS Support in a Multimedia DBMS
Multimedia database systems (MMDBSs) have to be capable to handle efficiently time-dependent and timeindependent data, and to support Quality-of-Service (QoS). To support continuo...
Pål Halvorsen, Vera Goebel, Thomas Plagemann
« Prev « First page 4174 / 4439 Last » Next »