Sciweavers

326 search results - page 49 / 66
» Capabilities for Uniqueness and Borrowing
Sort
View
CSREASAM
2006
13 years 9 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
KI
2008
Springer
13 years 7 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
TWC
2008
140views more  TWC 2008»
13 years 7 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
PVLDB
2010
133views more  PVLDB 2010»
13 years 6 months ago
RoadTrack: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness
Mobile commerce and location based services (LBS) are some of the fastest growing IT industries in the last five years. Location update of mobile clients is a fundamental capabil...
Péter Pesti, Ling Liu, Bhuvan Bamba, Arun I...
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 9 months ago
Sharoes: A Data Sharing Platform for Outsourced Enterprise Storage Environments
Abstract-- With fast paced growth of digital data and exploding storage management costs, enterprises are looking for new ways to effectively manage their data. One such cost-effec...
Aameek Singh, Ling Liu