Sciweavers

1801 search results - page 261 / 361
» Implementation-Oriented Secure Architectures
Sort
View
127
Voted
IWC
2007
100views more  IWC 2007»
15 years 3 months ago
Usefulness of VRML building models in a direction finding context
This paper describes an experiment which aims to examine the effectiveness and efficiency of a Virtual Reality Modelling Language (VRML) building model compared with equivalent ar...
Pietro Murano, Dino Mackey
174
Voted
ANSOFT
2002
171views more  ANSOFT 2002»
15 years 3 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
143
Voted
CCR
2002
111views more  CCR 2002»
15 years 3 months ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
153
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Low-cost communication for rural internet kiosks using mechanical backhaul
Rural kiosks in developing countries provide a variety of services such as birth, marriage, and death certificates, electricity bill collection, land records, email services, and...
Aaditeshwar Seth, D. Kroeker, Matei A. Zaharia, Sh...
107
Voted
DAC
2005
ACM
16 years 4 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...