Sciweavers

942 search results - page 184 / 189
» From System Comprehension to Program Comprehension
Sort
View
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
DAWAK
2006
Springer
13 years 11 months ago
Extending Visual OLAP for Handling Irregular Dimensional Hierarchies
Comprehensive data analysis has become indispensable in a variety of environments. Standard OLAP (On-Line Analytical Processing) systems, designed for satisfying the reporting need...
Svetlana Mansmann, Marc H. Scholl
DSN
2006
IEEE
13 years 11 months ago
A Contribution Towards Solving the Web Workload Puzzle
World Wide Web, the biggest distributed system ever built, experiences tremendous growth and change in Web sites, users, and technology. A realistic and accurate characterization ...
Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wan...
CIVR
2008
Springer
152views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Evaluating audio skimming and frame rate acceleration for summarizing BBC rushes
For the first time in 2007, TRECVID considered structured evaluation of automated video summarization, utilizing BBC rushes video. In 2007, we conducted user evaluations with the ...
Michael G. Christel, Wei-Hao Lin, Bryan Maher
DSVIS
2008
Springer
13 years 9 months ago
Multi-fidelity User Interface Specifications
Specifying user interfaces consists in a fundamental activity in the user interface development life cycle as it informs the subsequent steps. Good quality specifications could lea...
Thomas Memmel, Jean Vanderdonckt, Harald Reiterer