Sciweavers

28 search results - page 3 / 6
» A multi-method approach for user-centered design of identity...
Sort
View
APPT
2007
Springer
13 years 12 months ago
Domain Level Page Sharing in Xen Virtual Machine Systems
The memory size limits the scalability of virtual machine systems. There have been some researches about sharing identical pages among guest systems to reduce memory usage. However...
Myeongjae Jeon, Euiseong Seo, Junghyun Kim, Joonwo...
ACSAC
2000
IEEE
13 years 10 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
AMI
2010
Springer
13 years 4 months ago
A Distributed Many-Camera System for Multi-person Tracking
This article presents a modular, distributed and scalable many-camera system designed towards tracking multiple people simultaneously in a natural human-robot interaction scenario ...
Claus Lenz, Thorsten Röder, Martin Eggers, Si...
MOBIWAC
2009
ACM
14 years 9 days ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
DIM
2006
ACM
13 years 11 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...