Sciweavers

17951 search results - page 3443 / 3591
» Network Coding Applications
Sort
View
90
Voted
MSS
2003
IEEE
173views Hardware» more  MSS 2003»
15 years 3 months ago
Peabody: The Time Travelling Disk
Disk drives are now available with capacities on the order of hundreds of gigabytes. What has not become available is an easy way to manage storage. With installed machines locate...
Charles B. Morrey III, Dirk Grunwald
122
Voted
MM
2003
ACM
133views Multimedia» more  MM 2003»
15 years 3 months ago
Real-time compression for dynamic 3D environments
The goal of tele-immersion has long been to enable people at remote locations to share a sense of presence. A tele-immersion system acquires the 3D representation of a collaborato...
Sang-Uok Kum, Ketan Mayer-Patel, Henry Fuchs
98
Voted
PODC
2003
ACM
15 years 3 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
96
Voted
SACMAT
2003
ACM
15 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
102
Voted
SACMAT
2003
ACM
15 years 3 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
« Prev « First page 3443 / 3591 Last » Next »