Sciweavers

14824 search results - page 2878 / 2965
» Security - Introduction
Sort
View
SAC
2003
ACM
15 years 4 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
139
Voted
SIGGRAPH
2003
ACM
15 years 4 months ago
Forum: a new approach for the production of educational content
eLearning is developing at an ever increasing rate as universities and colleges recognize its vast potential to reach a deeper and fragmented student pool. For a while, eLearning ...
Christine Daviault, Marcelo Coelho
SIGUCCS
2003
ACM
15 years 4 months ago
Macintosh OS X: a smooth migration
The Ringling School of Art and Design is a fully accredited four year college of visual art and design with a student population of approximately 1000. The Ringling School has ach...
Scott E. Hanselman, Mahmoud Pegah
104
Voted
SPAA
2003
ACM
15 years 4 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
ASIACRYPT
2003
Springer
15 years 4 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
« Prev « First page 2878 / 2965 Last » Next »