Sciweavers

1165 search results - page 93 / 233
» Transparent Information Dissemination
Sort
View
AVI
2010
15 years 5 months ago
A new weaving technique for handling overlapping regions
The use of transparencies is a common strategy in visual representations to guarantee the visibility of different overlapping graphical objects, especially, if no visibility-decid...
Martin Luboschik, Axel Radloff, Heidrun Schumann
123
Voted
NSDI
2007
15 years 6 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
148
Voted
DAWAK
2005
Springer
15 years 9 months ago
Extending UML 2 Activity Diagrams with Business Intelligence Objects
Abstract. Data Warehouse (DWH) information is accessed by business processes. Today, no conceptual models exist that make the relationship between the DWH and the business processe...
Veronika Stefanov, Beate List, Birgit Korherr
IJNSEC
2007
96views more  IJNSEC 2007»
15 years 4 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
CSREAPSC
2006
15 years 5 months ago
A Policy-Based Location Identification Architecture for Pervasive Systems
In this paper, we present a policy-based architecture to be used in identifying the location of users within a pervasive system environment. Mobile users can define their own poli...
Sherif G. Aly