Sciweavers

251 search results - page 35 / 51
» The Case for Higher-Level Power Management
Sort
View
CIKM
2001
Springer
15 years 2 months ago
Caching Constrained Mobile Data
As mobile devices get ubiquitous and grow in computational power, their management of interdependent data also becomes increasingly important. The mobile environment exhibits all ...
Subhasish Mazumdar, Mateusz Pietrzyk, Panos K. Chr...
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 9 months ago
Spreadsheet modelling for solving combinatorial problems: The vendor selection problem
Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers...
Pandelis G. Ipsilandis
EUROPKI
2009
Springer
14 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
SAC
2005
ACM
15 years 3 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
BMCBI
2007
167views more  BMCBI 2007»
14 years 9 months ago
MindSeer: a portable and extensible tool for visualization of structural and functional neuroimaging data
Background: Three-dimensional (3-D) visualization of multimodality neuroimaging data provides a powerful technique for viewing the relationship between structure and function. A n...
Eider B. Moore, Andrew V. Poliakov, Peter Lincoln,...