Sciweavers

2757 search results - page 433 / 552
» On separating systems
Sort
View
SISW
2003
IEEE
15 years 9 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim
VISUALIZATION
2003
IEEE
15 years 9 months ago
Counting Cases in Marching Cubes: Toward a Generic Algorithm for Producing Substitopes
We describe how to count the cases that arise in a family of visualization techniques, including Marching Cubes, Sweeping Simplices, Contour Meshing, Interval Volumes, and Separat...
David C. Banks, Stephen A. Linton
SOFTVIS
2003
ACM
15 years 9 months ago
A New Approach for Visualizing UML Class Diagrams
UML diagrams have become increasingly important in the engineering and reengineering processes for software systems. Of particular interest are UML class diagrams whose purpose is...
Carsten Gutwenger, Michael Jünger, Karsten Kl...
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 9 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
CAISE
2003
Springer
15 years 9 months ago
Multidimensional Schemas Quality Assessment
: A data warehouse is a database focused on decision making. It is built separately from the transactional (OLTP) databases of the enterprise, although it is partly fed from transa...
Nicolas Prat, Samira Si-Said Cherfi