Sciweavers

64 search results - page 6 / 13
» Designing Government Information Access Programs: A Holistic...
Sort
View
WISEC
2010
ACM
13 years 7 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ICAIL
2009
ACM
14 years 1 months ago
Reasoning with spatial plans on the semantic web
ct Land use regulations are an important but often underrated legal domain. Especially in densely populated regions such as the Netherlands, spatial plans have a profound impact on...
Rinke Hoekstra, Radboud Winkels, Erik Hupkes
IFIP
1999
Springer
13 years 11 months ago
Virtual environments in educational networks
: The field of Virtual Environments (VEs) is rapidly evolving into a new means of communication and accessing information, likely to overcome many existent technologies. However, b...
Christos Bouras, Agisilaos Konidaris, Afrodite Sev...
DAWAK
2000
Springer
13 years 11 months ago
Applying Vertical Fragmentation Techniques in Logical Design of Multidimensional Databases
In the context of multidimensional databases implemented on relational DBMSs through star schemes, the most effective technique to enhance performances consists of materializing re...
Matteo Golfarelli, Dario Maio, Stefano Rizzi
VRST
2006
ACM
14 years 1 months ago
Intuitively specifying object dynamics in virtual environments using VR-WISE
Designing and building Virtual Environments is not an easy task, especially when it comes to specifying object behavior where either knowledge about animation techniques or progra...
Bram Pellens, Frederic Kleinermann, Olga De Troyer