Sciweavers

511 search results - page 37 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
TREC
2000
15 years 5 months ago
CINDOR TREC-9 English-Chinese Evaluation
MNIS-TextWise Labs participated in the TREC-9 Chinese Cross-Language Information Retrieval track. The focus of our research for this participation has been on rapidly adding Chine...
Miguel E. Ruiz, Steve Rowe, Maurice Forrester, Par...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 7 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
DAC
2009
ACM
15 years 1 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
MM
2003
ACM
262views Multimedia» more  MM 2003»
15 years 9 months ago
ARMS: adaptive rich media secure streaming
In this demonstration we present the ARMS system which enables secure and adaptive rich media streaming to a large-scale, heterogeneous client population. The ARMS system dynamica...
Lisa Amini, Raymond Rose, Chitra Venkatramani, Oli...
ITRUST
2004
Springer
15 years 9 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos