Sciweavers

2319 search results - page 464 / 464
» A Method for the Design and Development of Distributed Appli...
Sort
View
DRM
2006
Springer
13 years 10 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
MBEC
2011
198views more  MBEC 2011»
13 years 1 months ago
Clinically oriented real-time monitoring of the individual's risk for deep tissue injury
Spinal cord injury patients are under daily risk for developing deep tissue injury which is a severe pressure ulcer that initiates in soft tissues at the bones’ proximity. We aim...
Sigal Portnoy, Nicolas Vuillerme, Yohan Payan, Ami...
SASN
2004
ACM
13 years 12 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
WWW
2009
ACM
14 years 7 months ago
Incorporating site-level knowledge to extract structured data from web forums
Web forums have become an important data resource for many web applications, but extracting structured data from unstructured web forum pages is still a challenging task due to bo...
Jiang-Ming Yang, Rui Cai, Yida Wang, Jun Zhu, Lei ...