Sciweavers

1770 search results - page 99 / 354
» Writing requirements in computer security
Sort
View
VLSID
2007
IEEE
130views VLSI» more  VLSID 2007»
14 years 9 months ago
Memory Architecture Exploration for Power-Efficient 2D-Discrete Wavelet Transform
The Discrete Wavelet Transform (DWT) forms the core of the JPEG2000 image compression algorithm. Since the JPEG2000 compression application is heavily data-intensive, the overall ...
Rahul Jain, Preeti Ranjan Panda
ICEIS
2005
IEEE
14 years 2 months ago
Narrative Support for Technical Documents: Formalising Rhetorical Structure Theory
: Business Process Re-engineering (BPR) is an area that requires a lot of technical documents and an important feature of a well-written document is a coherent narrative. Even thou...
Nishadi De Silva, Peter Henderson
ISORC
2002
IEEE
14 years 2 months ago
Commanding and Reactive Control of Peripherals in the TMO Programming Scheme
: Although high-level real-time distributed computing objects are generally written in forms independent of execution platforms, input and output (I/O) activities involving periphe...
K. H. Kim
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 10 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
WMCSA
2000
IEEE
14 years 1 months ago
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices
The Post-PC revolution is bringing information access to a wide-range of devices beyond the desktop, such as public kiosks, and mobile devices like cellular telephones, PDAs, and ...
Steven J. Ross, Jason L. Hill, Michael Y. Chen, An...