Sciweavers

2386 search results - page 409 / 478
» Database Security 2000
Sort
View
JOC
2000
130views more  JOC 2000»
13 years 9 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
PUC
2000
94views more  PUC 2000»
13 years 9 months ago
Places to Stay on the Move: Software Architectures for Mobile User Interfaces
abstract Alan Dix Devina Ramduny Tom Rodden, Nigel Davies. aQtive limited and Staffordshire University Staffordshire University Lancaster University http://www.hiraeth.com/alan/top...
Alan J. Dix, Devina Ramduny, Tom Rodden, Nigel Dav...
FS
2010
105views more  FS 2010»
13 years 8 months ago
Local time and the pricing of time-dependent barrier options
Abstract A time-dependent double-barrier option is a derivative security that delivers the terminal value φ(ST ) at expiry T if neither of the continuous time-dependent barriers b...
Aleksandar Mijatovic
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
14 years 10 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
14 years 10 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias