Sciweavers

871 search results - page 69 / 175
» A Decentralized Authorization Architecture
Sort
View
EUROMED
2010
14 years 7 months ago
Hyperspectral Ground Truth Data for the Detection of Buried Architectural Remains
The aim of the study is to validate hyperspectral ground data for the detection of buried architectural remains. For this reason spectro-radiometric measurements were taken from an...
Athos Agapiou, Diofantos G. Hadjimitsis, Apostolos...
CSE
2009
IEEE
15 years 4 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 4 months ago
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel
Strategic Business and IT Alignment (SBITA) is still ranked amongst the top concerns of the enterprise’s management executives. Such alignment is an organization-wide issue that...
Leonel Plazaola, Johnny Flores, Norman Vargas, Mat...
ICADL
2007
Springer
112views Education» more  ICADL 2007»
15 years 4 months ago
Automated Template-Based Metadata Extraction Architecture
This paper describes our efforts to develop a toolset and process for automated metadata extraction from large, diverse, and evolving document collections. A number of federal agen...
Paul Flynn, Li Zhou, Kurt Maly, Steven J. Zeil, Mo...
SIGCOMM
2005
ACM
15 years 3 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson