Sciweavers

445 search results - page 84 / 89
» Authorization and Access Control in IRO-DB
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
SAC
2009
ACM
15 years 2 months ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
WCE
2007
14 years 10 months ago
A Proactive Horizontal Handover Algorithm for WiFi-WiMax Interoperable Networks
— Two important high bandwidth wireless certifications in our days are Worldwide Interoperability for Microwave Access (WiMax) and Wireless Fidelity (WiFi). They can interoperate...
Álvaro Suárez Sarmiento, Kholoud Elb...
ADHOC
2005
84views more  ADHOC 2005»
14 years 9 months ago
Infrastructure-based MAC in wireless mobile ad-hoc networks
- The IEEE 802.11 standard is the most popular Medium Access Control (MAC) protocol for wireless local area networks. However, in an ad-hoc environment, the Point Coordination Func...
Hossam S. Hassanein, Tiantong You, Hussein T. Mouf...