Sciweavers

24529 search results - page 278 / 4906
» Computing on Authenticated Data
Sort
View
PERCOM
2010
ACM
15 years 2 months ago
Towards the adaptive integration of multiple context reasoners in pervasive computing environments
Abstract—The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people’s everyday tasks by proactively providing appropriate i...
Daniele Riboni, Linda Pareschi, Claudio Bettini
126
Voted
PERCOM
2004
ACM
16 years 3 months ago
MediaBroker: An Architecture for Pervasive Computing
We present MediaBroker, a distributed framework designed to support pervasive computing applications. Specifically, we propose an architecture consisting of a transport engine and...
Martin Modahl, Ilya Bagrak, Matthew Wolenetz, Phil...
170
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ICIP
2000
IEEE
16 years 5 months ago
Optimal Design of Transform Coders and Quantizers for Image Classification
In a variety of applications (including automatic target recognition) image classification algorithms operate on compressed image data. This paper explores the design of optimal t...
Soumya Jana, Pierre Moulin
WISA
2009
Springer
15 years 10 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...