Sciweavers

1308 search results - page 237 / 262
» Performance and extension of user space file systems
Sort
View
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
APGV
2006
ACM
15 years 3 months ago
Updating orientation in large virtual environments using scaled translational gain
Navigating through large virtual environments using a headmounted display (HMD) is difficult due to the spatial limitations of the tracking system. We conducted two experiments t...
Betsy Williams, Gayathri Narasimham, Timothy P. Mc...
EUSAI
2004
Springer
15 years 3 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira
EH
2000
IEEE
183views Hardware» more  EH 2000»
15 years 2 months ago
A Reconfigurable Platform for the Automatic Synthesis of Analog Circuits
Reconfigurable chips are integrated circuits whose internal connections can be programmed by the user to attend a specific application. Field Programmable Gate Arrays (FPGAs) and ...
Ricardo Salem Zebulum, Cristina Costa Santini, Hel...
SIGMOD
1996
ACM
120views Database» more  SIGMOD 1996»
15 years 1 months ago
Implementing Data Cubes Efficiently
Decision support applications involve complex queries on very large databases. Since response times should be small, query optimization is critical. Users typically view the data ...
Venky Harinarayan, Anand Rajaraman, Jeffrey D. Ull...