Sciweavers

1663 search results - page 51 / 333
» Computer Security in the Real World
Sort
View
USS
2008
15 years 4 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
AUTONOMICS
2008
ACM
15 years 3 months ago
MWM: a map-based world model for wireless sensor networks
A prominent functionality of a Wireless Sensor Network (WSN) is environmental monitoring. For this purpose the WSN creates a model for the real world by using abstractions to pars...
Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Aya...
CVPR
2007
IEEE
16 years 4 months ago
Change Detection in a 3-d World
This paper examines the problem of detecting changes in a 3-d scene from a sequence of images, taken by cameras with arbitrary but known pose. No prior knowledge of the state of n...
Thomas Pollard, Joseph L. Mundy
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 5 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
ECIS
2000
15 years 3 months ago
Modelling in the Digital World - An Anti-Realist Perspective
This paper considers how we are constructing and modelling digital realities, and considers the relationships between digital realities and our reality using concepts from traditio...
Matthew J. Dovey