Sciweavers

9162 search results - page 1451 / 1833
» System and User Data Complexity
Sort
View
136
Voted
ACSAC
2002
IEEE
15 years 10 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...
PG
2002
IEEE
15 years 10 months ago
Augmenting Computer Graphics with Haptics for the Visualization of Vessel Networks
Current visualization methods of volume angiograms are limited in their ability to display vessel connectivity and depth information readily available in the data set. In this wor...
Dingrong Yi, Vincent Hayward
ICDCS
1994
IEEE
15 years 9 months ago
Submission of Transactions from Mobile Workstations in a Cooperative Multidatabase Processing Environment
In a multidatabase environment with mobile computers involved, the nature of computing is such that the user may not wait for the submitted global transaction to complete before d...
L. H. Yeo, Arkady B. Zaslavsky
ECHT
1994
15 years 9 months ago
VIKI: Spatial Hypertext Supporting Emergent Structure
The emergent nature of structure is a crucial, but often ignored, constraint on authoring hypertexts. VIKI is a spatial hypertext system that supports the emergent s of structure ...
Catherine C. Marshall, Frank M. Shipman III, James...
141
Voted
SIGCOMM
1994
ACM
15 years 9 months ago
Experiences with a High-Speed Network Adaptor: A Software Perspective
This paper describes our experiences, from a software perspective, with the OSIRIS network adaptor. It first identifies the problems we encountered while programming OSIRIS and op...
Peter Druschel, Larry L. Peterson, Bruce S. Davie
« Prev « First page 1451 / 1833 Last » Next »