Sciweavers

4770 search results - page 675 / 954
» Using System-on-a-Programmable-Chip Technology to Design Emb...
Sort
View
DEBS
2003
ACM
15 years 10 months ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra
157
Voted
DRM
2006
Springer
15 years 8 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ICALT
2008
IEEE
15 years 11 months ago
Competence Based Educational Metadata for Supporting Lifelong Competence Development Programmes
In the context of the emerging paradigm of Lifelong Learning, competence-based learning is gradually attracting the attention of the Technology-Enhanced Learning community, since ...
Demetrios G. Sampson, Demetrios Fytros
143
Voted
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 10 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
148
Voted
WISEC
2010
ACM
15 years 12 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko