Conference paper
Placement of multimedia blocks on zoned disks
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996
For many years, defence intelligence and government organizations have been using highly specialized security technologies to control access to sensitive information and to protect the integrity of information. In the face of increasing insider trading and industrial espionage, this paper describes how business can exploit technology that has previously been available only to spooks and is now available in open systems products.
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996
Raymond F. Boyce, Donald D. Chamberlin, et al.
CACM
Reena Elangovan, Shubham Jain, et al.
ACM TODAES
Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008