Sciweavers

227 search results - page 31 / 46
» Towards OLAP Security Design - Survey and Research Issues
Sort
View
84
Voted
CHI
2009
ACM
16 years 1 months ago
An fNIR based BMI for letter construction using continuous control
A long term goal of assistive technology research is to build creative expression applications where subjects can extemporaneously express themselves. Sketch drawing is one form o...
Rudolph L. Mappus IV, Girish R. Venkatesh, Chetna ...
105
Voted
ARC
2009
Springer
241views Hardware» more  ARC 2009»
15 years 7 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
VISUALIZATION
2003
IEEE
15 years 5 months ago
Visualizing Spatial and Temporal Variability in Coastal Observatories
In this paper, we describe a set of 3D and 4D visualization tools and techniques for CORIE, a complex environmental observation and forecasting system (EOFS) for the Columbia Rive...
Walter Jiménez, Wagner Toledo Corrêa,...
97
Voted
CCR
2006
110views more  CCR 2006»
15 years 16 days ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis
82
Voted
COMPSAC
2004
IEEE
15 years 4 months ago
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. T...
Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian