Sciweavers

5525 search results - page 1084 / 1105
» Verification of Model Transformations
Sort
View
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 4 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
CITA
2003
IEEE
14 years 4 months ago
Internet Diffusion and E-Business Opportunities Amongst Malaysian Travel Agencies
This paper reports an investigation into the adoption of the Internet amongst Malaysian travel agencies as a means of exploring the likely future potential growth of e-business wi...
Raja Mazhatul Yasmin Suraya
IV
2003
IEEE
200views Visualization» more  IV 2003»
14 years 4 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
NDSS
2003
IEEE
14 years 4 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
RTSS
2003
IEEE
14 years 4 months ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
« Prev « First page 1084 / 1105 Last » Next »