Villanova University

Displaying 1-6 of 6 results

  • White Papers // Aug 2012

    Batch Spreadsheet for C Programmers

    A computing environment is proposed, based on batch spreadsheet processing, which produces a spreadsheet display from plain text input files of commands, similar to the way documents are created using LaTeX. In this environment, besides the usual spreadsheet rows and columns of cells, variables can be defined and are stored...

    Provided By Villanova University

  • White Papers // Jan 2009

    Security, Fault-Tolerance and Their Verification for Ambient Systems

    For the emerging ambient environments, in which interconnected intelligent devices will surround to increase the comfort of lives, fault tolerance and security are of paramount importance. In contrast to the computers in a normal distributed system, ambient devices are generally small (meaning they have little computing power or memory space),...

    Provided By Villanova University

  • White Papers // Dec 2008

    Accelerated Wireless Broadband Infrastructure Deployment: Impact on GDP & Employment 2009-2010

    Because of current economic conditions, President-elect Barack Obama has said that his Administration's major goal will be a stimulus package targeting job growth. Specifically, the President-elect's Transition Team is looking for key sectors of the economy that can, with a relatively small amount of financial stimulus, yield significant and rapid...

    Provided By Villanova University

  • White Papers // Dec 2008

    Network Security: Compromises and Countermeasures

    Network security is a long-standing and well-recognized problem in the computing world. Protecting information is a main priority of a network administrator, with security techniques becoming increasingly robust. As more and more information has become digital, security of this digital information has tightened and mitigation techniques to protect the information...

    Provided By Villanova University

  • White Papers // May 2008

    An Analysis of Data Anomalies in Data Mining and Knowledge Discovery in Data

    The viewpoint from which data anomalies are defined, detected and managed may vary based on a given data set and the specific goals of an application. Anomalous data can be viewed as extraneous noise that negatively impacts a data mining analysis. Alternatively, discovering data anomalies may be the actual goal...

    Provided By Villanova University

  • White Papers // May 2008

    Design of an Automatic Password Protection Mechanism for Digital Documents

    Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large volume of such transmissions, it is inevitable that some material will be inadvertently sent to unintended recipients, leading potentially to the unintended revelation of private data....

    Provided By Villanova University

  • White Papers // Jan 2009

    Security, Fault-Tolerance and Their Verification for Ambient Systems

    For the emerging ambient environments, in which interconnected intelligent devices will surround to increase the comfort of lives, fault tolerance and security are of paramount importance. In contrast to the computers in a normal distributed system, ambient devices are generally small (meaning they have little computing power or memory space),...

    Provided By Villanova University

  • White Papers // Dec 2008

    Network Security: Compromises and Countermeasures

    Network security is a long-standing and well-recognized problem in the computing world. Protecting information is a main priority of a network administrator, with security techniques becoming increasingly robust. As more and more information has become digital, security of this digital information has tightened and mitigation techniques to protect the information...

    Provided By Villanova University

  • White Papers // Dec 2008

    Accelerated Wireless Broadband Infrastructure Deployment: Impact on GDP & Employment 2009-2010

    Because of current economic conditions, President-elect Barack Obama has said that his Administration's major goal will be a stimulus package targeting job growth. Specifically, the President-elect's Transition Team is looking for key sectors of the economy that can, with a relatively small amount of financial stimulus, yield significant and rapid...

    Provided By Villanova University

  • White Papers // May 2008

    An Analysis of Data Anomalies in Data Mining and Knowledge Discovery in Data

    The viewpoint from which data anomalies are defined, detected and managed may vary based on a given data set and the specific goals of an application. Anomalous data can be viewed as extraneous noise that negatively impacts a data mining analysis. Alternatively, discovering data anomalies may be the actual goal...

    Provided By Villanova University

  • White Papers // May 2008

    Design of an Automatic Password Protection Mechanism for Digital Documents

    Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large volume of such transmissions, it is inevitable that some material will be inadvertently sent to unintended recipients, leading potentially to the unintended revelation of private data....

    Provided By Villanova University

  • White Papers // Aug 2012

    Batch Spreadsheet for C Programmers

    A computing environment is proposed, based on batch spreadsheet processing, which produces a spreadsheet display from plain text input files of commands, similar to the way documents are created using LaTeX. In this environment, besides the usual spreadsheet rows and columns of cells, variables can be defined and are stored...

    Provided By Villanova University