Sciweavers

3086 search results - page 546 / 618
» Developing Secure Web Applications
Sort
View
MODELS
2007
Springer
14 years 3 months ago
UML2Alloy: A Challenging Model Transformation
Abstract. Alloy is a formal language, which has been applied to modelling of systems in a wide range of application domains. It is supported by Alloy Analyzer, a tool, which allows...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 3 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
DSD
2005
IEEE
104views Hardware» more  DSD 2005»
14 years 2 months ago
Design of Transport Triggered Architecture Processors for Wireless Encryption
Transport Triggered Architecture (TTA) offers a costeffective trade-off between the size and performance of ASICs and the programmability of general-purpose processors. In this pa...
Panu Hämäläinen, Jari Heikkinen, Ma...
EUC
2005
Springer
14 years 2 months ago
Human Position/Height Detection Using Analog Type Pyroelectric Sensors
Abstract. Pyroelectric sensors can detect changes of infrared rays. Usually, typical pyroelectric sensors are the digital output type, used for lighting switches and security syste...
Shinya Okuda, Shigeo Kaneda, Hirohide Haga
ICDCIT
2005
Springer
14 years 2 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy