Sciweavers

6300 search results - page 1240 / 1260
» We have it easy, but do we have it right
Sort
View
LISA
2008
13 years 9 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
NSDI
2008
13 years 9 months ago
Beyond Pilots: Keeping Rural Wireless Networks Alive
Very few computer systems that have been deployed in rural developing regions manage to stay operationally sustainable over the long term; most systems do not go beyond the pilot ...
Sonesh Surana, Rabin K. Patra, Sergiu Nedevschi, M...
DGCI
2008
Springer
13 years 9 months ago
Selection of Local Thresholds for Tomogram Segmentation by Projection Distance Minimization
Abstract. Segmentation is an important step to obtain quantitative information from tomographic data sets. To this end, global thresholding is often used in practice. However, it i...
Kees Joost Batenburg, Jan Sijbers
ACSW
2004
13 years 8 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic
CSREAESA
2003
13 years 8 months ago
Common Mistakes in Adiabatic Logic Design and How to Avoid Them
Most so-called “adiabatic” digital logic circuit families reported in the low-power design literature are actually not truly adiabatic, in that they do not satisfy the general...
Michael P. Frank
« Prev « First page 1240 / 1260 Last » Next »