Sciweavers

1527 search results - page 222 / 306
» A Survey of Web Security
Sort
View
CASES
2003
ACM
15 years 4 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
WSNA
2003
ACM
15 years 4 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
WWW
2007
ACM
16 years 1 days ago
U-REST: an unsupervised record extraction system
In this paper, we describe a system that can extract record structures from web pages with no direct human supervision. Records are commonly occurring HTML-embedded data tuples th...
Yuan Kui Shen, David R. Karger
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
15 years 6 months ago
Understanding Coordination in IT Project-Based Environments: An Examination of Team Cognition and Virtual Team Efficacy
Research has demonstrated how successful coordination can lead to greater organizational performance. In information technology (IT) projectbased environments, coordinating the kn...
Mark Keith, Haluk Demirkan, Michael Goul
CSE
2009
IEEE
15 years 6 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...