Sciweavers

1770 search results - page 128 / 354
» Writing requirements in computer security
Sort
View
PC
2002
189views Management» more  PC 2002»
13 years 10 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
KES
2004
Springer
14 years 3 months ago
An Efficient Fuzzy Method for Handwritten Character Recognition
The main challenge in handwritten character recognition involves the development of a method that can generate descriptions of the handwritten objects in a short period of time. Du...
Romesh Ranawana, Vasile Palade, G. E. M. D. C. Ban...
DSVIS
2003
Springer
14 years 3 months ago
Architectures for Widget-Level Plasticity
rs to become familiar with abstract modeling concepts or difficult language syntax. This is a departure from traditional visual interface development tools, in which developers sel...
Baha Jabarin, T. C. Nicholas Graham
DOLAP
1999
ACM
14 years 2 months ago
Aggregation Everywhere: Data Reduction and Transformation in the Phoenix Data Warehouse
This paper describes the Phoenix system, which loads a data warehouse and then reports against it. Between the raw atomic data of the source system and the business measures prese...
Steven Tolkin