Sciweavers

1147 search results - page 193 / 230
» Transformation of Access Rights
Sort
View
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
13 years 8 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
MOBICOM
2012
ACM
12 years 25 days ago
MARVEL: multiple antenna based relative vehicle localizer
Access to relative location of nearby vehicles on the local roads or on the freeways is useful for providing critical alerts to the drivers, thereby enhancing their driving experi...
Dong Li, Tarun Bansal, Zhixue Lu, Prasun Sinha
ICDE
2007
IEEE
132views Database» more  ICDE 2007»
14 years 11 months ago
XPlainer: Visual Explanations of XPath Queries
The popularity of XML has motivated the development of novel XML processing tools many of which embed the XPath language for XML querying, transformation, constraint specification...
Mariano P. Consens, John W. S. Liu, Flavio Rizzolo
ICDE
2002
IEEE
102views Database» more  ICDE 2002»
14 years 11 months ago
Cost Models for Overlapping and Multi-Version B-Trees
Overlapping and multi-version techniques are two popular frameworks that transform an ephemeral index into a multiple logical-tree structure in order to support versioning databas...
Yufei Tao, Dimitris Papadias, Jun Zhang
DAC
2006
ACM
14 years 11 months ago
Behavior and communication co-optimization for systems with sequential communication media
In this paper we propose a new communication synthesis approach targeting systems with sequential communication media (SCM). Since SCMs require that the reading sequence and writi...
Jason Cong, Yiping Fan, Guoling Han, Wei Jiang, Zh...