Sciweavers

1921 search results - page 319 / 385
» : Designing a Scalable Build Process
Sort
View
MM
2009
ACM
196views Multimedia» more  MM 2009»
14 years 3 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
IEEEARES
2008
IEEE
14 years 3 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
14 years 3 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 3 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
ICALT
2007
IEEE
14 years 3 months ago
Towards a Canonical View of Peer Assessment
Peer Assessment (or Peer Review) is a popular form of reciprocal assessment where students produce feedback, or grades, for each others work. Peer Assessment activities can be ext...
David E. Millard, Karen Fill, Lester Gilbert, Yvon...