Sciweavers

1373 search results - page 207 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
JAIR
2010
130views more  JAIR 2010»
14 years 8 months ago
A Constraint Satisfaction Framework for Executing Perceptions and Actions in Diagrammatic Reasoning
Diagrammatic reasoning (DR) is pervasive in human problem solving as a powerful adjunct to symbolic reasoning based on language-like representations. The research reported in this...
Bonny Banerjee, B. Chandrasekaran
USENIX
1994
14 years 11 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 4 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
PDP
2007
IEEE
15 years 4 months ago
Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations
Heterogeneous networks of workstations have rapidly become a cost-effective computing solution in many application areas. This paper develops several highly innovative parallel al...
Antonio Plaza, David Valencia, Soraya Blazquez, Ja...
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
14 years 9 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang