Sciweavers

350 search results - page 52 / 70
» An artificial immune system architecture for computer securi...
Sort
View
EUC
2005
Springer
15 years 5 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...
ATAL
2007
Springer
15 years 6 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
WWW
2005
ACM
16 years 12 days ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
MOBICOM
2010
ACM
14 years 12 months ago
Physical-layer identification of UHF RFID tags
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...
Davide Zanetti, Boris Danev, Srdjan Capkun
SACMAT
2003
ACM
15 years 5 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...