Sciweavers

4678 search results - page 50 / 936
» Integrated University Information Systems
Sort
View
IH
1998
Springer
14 years 1 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
ITICSE
2005
ACM
14 years 2 months ago
Providing students universal access to a centralized, graphical computing environment
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Michael H. Goldwasser, David Letscher
OZCHI
2006
ACM
14 years 2 months ago
Mobile helper for university students: a design for a mobile learning environment
This paper reports on a design case study for a mobile learning (M-learning) environment that follows a usercentred design approach. This development of the system applied an M-le...
Richard Brown, Hokyoung Ryu, David Parsons
CBMS
2006
IEEE
14 years 2 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...