Sciweavers

762 search results - page 118 / 153
» How to realize
Sort
View
WIAS
2010
102views more  WIAS 2010»
13 years 8 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
SOCA
2010
IEEE
13 years 7 months ago
Service-oriented data quality engineering and data publishing in the cloud
Traditional data quality engineering techniques, often used and deployed within a single enterprise environment, are inadequate to cope with the rapid change of data, with a multit...
Marco Comerio, Hong Linh Truong, Carlo Batini, Sch...
UIST
2010
ACM
13 years 7 months ago
SqueezeBlock: using virtual springs in mobile devices for eyes-free interaction
Haptic feedback provides an additional interaction channel when auditory and visual feedback may not be appropriate. We present a novel haptic feedback system that changes its ela...
Sidhant Gupta, Tim Campbell, Jeffrey R. Hightower,...
AISS
2010
107views more  AISS 2010»
13 years 7 months ago
A Practical Method of Reducing the Gaps in e-Government Interoperability Implementation: Case of Patient Referral Information Ex
In recent years, e-government interoperability frameworks (e-GIFs) and enterprise architectures (EAs) have been extensively developed as mechanism tools for achieving the interope...
Apitep Saekow, Choompol Boonmee
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 4 months ago
Fully Simulatable Quantum-Secure Coin-Flipping and Applications
We propose a coin-flip protocol which yields a string of strong, random coins and is fully simulatable against poly-sized quantum adversaries on both sides. It can be implemented ...
Carolin Lunemann, Jesper Buus Nielsen