Sciweavers

1611 search results - page 259 / 323
» An Access Control Model for Video Database Systems
Sort
View
79
Voted
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 4 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
ESORICS
2004
Springer
15 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
STORAGESS
2006
ACM
15 years 3 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
LCTRTS
2004
Springer
15 years 3 months ago
Spinach: a liberty-based simulator for programmable network interface architectures
This paper presents Spinach, a new simulator toolset specifically designed to target programmable network interface architectures. Spinach models both system components that are ...
Paul Willmann, Michael Brogioli, Vijay S. Pai
VIS
2009
IEEE
215views Visualization» more  VIS 2009»
15 years 11 months ago
BrainGazer - Visual Queries for Neurobiology Research
Abstract-- Neurobiology investigates how anatomical and physiological relationships in the nervous system mediate behavior. Molecular genetic techniques, applied to species such as...
Stefan Bruckner, Veronika Šoltészová, M. Edua...