Sciweavers

9162 search results - page 113 / 1833
» System and User Data Complexity
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 4 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ICEIS
2009
IEEE
15 years 4 months ago
Relaxing XML Preference Queries for Cooperative Retrieval
Today XML is an essential technology for knowledge management within enterprises and dissemination of data over the Web. Therefore the efficient evaluation of XML queries has been ...
SungRan Cho, Wolf-Tilo Balke
ICCS
2009
Springer
14 years 7 months ago
Graphical Notation for Diagramming Coupled Systems
Multiphysics and multiscale
J. Walter Larson
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 24 days ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
ICSE
2007
IEEE-ACM
15 years 10 months ago
Engineering Medical Information Systems: Architecture, Data and Usability & Security
There has been increasing pressure on the health care sector to adopt information technologies to rationalize service delivery and increase service quality. Medical information sy...
Jens H. Weber-Jahnke, Morgan Price