Sciweavers

20655 search results - page 3939 / 4131
» Exploring Software Systems
Sort
View
DBSEC
2003
149views Database» more  DBSEC 2003»
14 years 4 days ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
GRAPHICSINTERFACE
2001
14 years 4 days ago
Interacting with Image Sequences: Detail-in-Context and Thumbnails
An image sequence is a series of interrelated images. To enable navigation of large image sequences, many current software packages display small versions of the images, called th...
Oliver Kuederle, Kori Inkpen, M. Stella Atkins, M....
ISSA
2004
14 years 4 days ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee
ECIS
2003
14 years 4 days ago
A multi-model algorithm for the cost-oriented design of the information technology infrastructure
Multiple combinations of hardware and network components can be selected to design an information technology (IT) infrastructure that satisfies performance requirements. The profe...
Danilo Ardagna, Chiara Francalanci, Marco Trubian
IADIS
2003
14 years 4 days ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
« Prev « First page 3939 / 4131 Last » Next »