Sciweavers

3937 search results - page 601 / 788
» Questioning Ubiquitous Computing
Sort
View
CSCWD
2001
Springer
14 years 2 months ago
A Case Study on Distributed, Collaborative Design: Investigating Communication and Information Flow
A current research project at the University of Strathclyde is introduced which aims to better understand the role of distributed engineering design in industry and address presen...
Steven P. MacGregor, Avril I. Thomson, Neal P. Jus...
EUROCRYPT
2001
Springer
14 years 2 months ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
VLDB
2001
ACM
109views Database» more  VLDB 2001»
14 years 2 months ago
Mining Multi-Dimensional Constrained Gradients in Data Cubes
Constrained gradient analysis (similar to the “cubegrade” problem posed by Imielinski, et al. [9]) is to extract pairs of similar cell characteristics associated with big chan...
Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei...
DSN
2000
IEEE
14 years 2 months ago
Towards Continuous Availability of Internet Services through Availability Domains
The increasing number of Internet users has caused a dramatic increase in electronic commerce. This growth is outpacing technologies for dependability causing traditional views of...
Nicholas S. Bowen, Daniel C. Sturman, Tina Ting Li...
DSN
2000
IEEE
14 years 2 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan