Sciweavers

5372 search results - page 315 / 1075
» complexity 2007
Sort
View
108
Voted
WWW
2007
ACM
16 years 3 months ago
A password stretching method using user specific salts
In this paper, we present a password stretching method using user specific salts. Our scheme takes similar time to stretch a password as recent password stretching algorithms, but...
ChangHee Lee, Heejo Lee
116
Voted
ACSD
2007
IEEE
116views Hardware» more  ACSD 2007»
15 years 9 months ago
A Formal Model for Integrating Multiple Views
In this paper we show how to use labelled event structures as a unique mathematical representation for design models consisting of different UML 2.0 diagrams/notation. Each diagra...
Juliana Küster Filipe Bowles, Behzad Bordbar
113
Voted
AINA
2007
IEEE
15 years 9 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
119
Voted
AINA
2007
IEEE
15 years 9 months ago
The Community Stack: Concept and Prototype
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
Tuan Nguyen, Seng Wai Loke, Torab Torabi
CEC
2007
IEEE
15 years 9 months ago
Automated design of a MEMS resonator
—As the application and complexity of microelectromechanical (MEMS) devices increases, there is a corresponding need for automated design and optimization tools to augment engine...
Jason D. Lohn, William F. Kraus, Gregory S. Hornby