Sciweavers

548 search results - page 34 / 110
» Attribute Support for Inter-Domain Use
Sort
View
JHSN
2006
267views more  JHSN 2006»
14 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
IFIP8
2004
14 years 11 months ago
Using Group Management to Tame Mobile Ad Hoc Networks
Mobile ad hoc networks (MANET) offer a convenient basis towards pervasive computing, due to inherent support for anytime, anywhere network access for mobile users. However, the dev...
Malika Boulkenafed, Daniele Sacchetti, Valé...
ICRA
1995
IEEE
155views Robotics» more  ICRA 1995»
15 years 1 months ago
An Inertial Sensor for Parts Inspection
This paper describes the development of a sensor which performs parts inspection by measuring the inertial properties of the part. The sensor comprises a platform supported on a c...
S. M. Tam, K. C. Cheung
PKDD
2010
Springer
124views Data Mining» more  PKDD 2010»
14 years 8 months ago
Summarising Data by Clustering Items
Abstract. For a book, the title and abstract provide a good first impression of what to expect from it. For a database, getting a first impression is not so straightforward. Whil...
Michael Mampaey, Jilles Vreeken
CCS
2007
ACM
15 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...