Sciweavers

18374 search results - page 3582 / 3675
» Applications for data hiding
Sort
View
PCRCW
1997
Springer
14 years 1 months ago
Power/Performance Trade-offs for Direct Networks
High performance portable and space-borne systems continue to demand increasing computation speeds while concurrently attempting to satisfy size, weight, and power constraints. As...
Chirag S. Patel, Sek M. Chai, Sudhakar Yalamanchil...
VLDB
1997
ACM
120views Database» more  VLDB 1997»
14 years 1 months ago
A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations
This paper presents a region splitting strategy for physical database design of multidimensional le organizations. Physical database design is the process of determining the optim...
Jong-Hak Lee, Young-Koo Lee, Kyu-Young Whang, Il-Y...
FOCS
1994
IEEE
14 years 1 months ago
The Load, Capacity and Availability of Quorum Systems
A quorum system is a collection of sets (quorums) every two of which intersect. Quorum systems have been used for many applications in the area of distributed systems, including mu...
Moni Naor, Avishai Wool
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 1 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
NATO
1993
14 years 1 months ago
METU Object-Oriented DBMS
METU Object-Oriented DBMS 1 includes the implementation of a database kernel, an object-oriented SQL-like language and a graphical user interface. Kernel functions are divided bet...
Asuman Dogac, Cetin Ozkan, Ismailcem Budak Arpinar...
« Prev « First page 3582 / 3675 Last » Next »