Sciweavers

1498 search results - page 195 / 300
» Creating Links into the Future
Sort
View
SECRYPT
2007
121views Business» more  SECRYPT 2007»
13 years 10 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
ACSW
2006
13 years 10 months ago
Improving resource utilisation in market oriented grid management and scheduling
Service providers of the future could dynamically negotiate for, and create their infrastructure on Grid based utility computing and communication providers. Such commercialisatio...
Kris Bubendorfer
AVI
2004
13 years 10 months ago
Shrinking window operations for expanding display space
Recent research and technology advances indicate that multiple monitor systems are likely to become commonplace in the near future. An important property of such systems is that t...
Dugald Ralph Hutchings, John T. Stasko
CSREASAM
2006
13 years 10 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
FECS
2006
529views Education» more  FECS 2006»
13 years 10 months ago
Student Projects in Computer Networking: Simulation versus Coding
In this paper, we discuss the advantages and disadvantages of using network simulators to teach networking concepts versus having students write programs. The authors have experie...
Leann Christianson, Kevin Q. Brown