Sciweavers

8982 search results - page 1557 / 1797
» Applications of Aglet Technology
Sort
View
TRUSTBUS
2010
Springer
15 years 2 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
VLSI
2010
Springer
15 years 2 months ago
Fine-grained post placement voltage assignment considering level shifter overhead
—Multi-Vdd techniques enable application of lower supply voltage levels on cells with timing slacks. New voltage assignment, placement and voltage island partitioning methods are...
Zohreh Karimi, Majid Sarrafzadeh
WIAS
2010
102views more  WIAS 2010»
15 years 2 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
151
Voted
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
15 years 2 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
CCS
2010
ACM
15 years 2 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
« Prev « First page 1557 / 1797 Last » Next »