Sciweavers

3349 search results - page 569 / 670
» Data Security
Sort
View
SISW
2003
IEEE
15 years 7 months ago
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
Securing data is more important than ever, yet cryptographic file systems still have not received wide use. One barrier to the adoption of cryptographic file systems is that the...
Charles P. Wright, Jay Dave, Erez Zadok
94
Voted
GI
2001
Springer
15 years 7 months ago
Towards a Novel Architecture to Support Universal Location Awareness
—The rapid advances in a wide range of wireless access technologies along with an industry-wide IP-convergence have set up the stage for context-aware computing. The “location...
Amiya Bhattacharya, Abhishek Roy, Sajal K. Das
143
Voted
ALIFE
2006
15 years 2 months ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho
ICEIS
2003
IEEE
15 years 7 months ago
Toxic Farm: A Cooperative Management Platform for Virtual Teams and Enterprises
: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Hala Skaf-Molli, Pascal Molli, Gérald Oster...
111
Voted
LREC
2010
154views Education» more  LREC 2010»
15 years 3 months ago
CCASH: A Web Application Framework for Efficient, Distributed Language Resource Development
We introduce CCASH (Cost-Conscious Annotation Supervised by Humans), an extensible web application framework for cost-efficient annotation. CCASH provides a framework in which cos...
Paul Felt, Owen Merkling, Marc Carmen, Eric K. Rin...