Sciweavers

5722 search results - page 906 / 1145
» Security Function Interactions
Sort
View
PSD
2004
Springer
108views Database» more  PSD 2004»
15 years 9 months ago
Developing Adoptable Disclosure Protection Techniques: Lessons Learned from a U.S. Experience
The development of new disclosure protection techniques is useful only insofar as those techniques are adopted by statistical agencies. In order for technical experts in disclosure...
Nicholas H. Greenia
SIGGRAPH
2003
ACM
15 years 9 months ago
Forum: a new approach for the production of educational content
eLearning is developing at an ever increasing rate as universities and colleges recognize its vast potential to reach a deeper and fragmented student pool. For a while, eLearning ...
Christine Daviault, Marcelo Coelho
SPAA
2003
ACM
15 years 9 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
DGO
2009
175views Education» more  DGO 2009»
15 years 5 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
IJISEC
2007
119views more  IJISEC 2007»
15 years 3 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny