Sciweavers

539 search results - page 5 / 108
» The N R One Time Password System
Sort
View
VLDB
1998
ACM
123views Database» more  VLDB 1998»
13 years 11 months ago
Diag-Join: An Opportunistic Join Algorithm for 1:N Relationships
Time of creation is one of the predominant (often implicit) clustering strategies found not only in Data Warehouse systems: line items are created together with their correspondin...
Sven Helmer, Till Westmann, Guido Moerkotte
CIC
2006
148views Communications» more  CIC 2006»
13 years 8 months ago
RPC LSP Detection and Fuzzy Control Mechanisms in ATM Based MPLS on BcN
A major goal of the BcN (Broadband Convergence Network) is to facilitate convergence of networks and services. Many transport-related technologies were considered. One technology ...
Chulsoo Kim, Semyung Park, Taewan Kim, Jungtae Lee
SIGUCCS
2003
ACM
14 years 10 days ago
Student staff: n. an energetic, brilliant, creative, talented potential rolled into a food-driven, sleep-deprived, unmotivated c
Students are a wonderful resource for any department of a college or university, especially an ITS department. They are inexpensive and abundant. They want to work at strange time...
Karen McRitchie
DRM
2004
Springer
14 years 14 days ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
NDSS
2005
IEEE
14 years 20 days ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...