Sciweavers

6574 search results - page 74 / 1315
» Current Signatures: Application
Sort
View
105
Voted
AINA
2006
IEEE
15 years 6 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi
103
Voted
ICMCS
2010
IEEE
258views Multimedia» more  ICMCS 2010»
15 years 1 months ago
A comparative study of similarity measures for content-based multimedia retrieval
Determining similarities among data objects is a core task of content-based multimedia retrieval systems. Approximating data object contents via flexible feature representations, ...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
PAM
2010
Springer
15 years 7 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
ICEIS
1999
IEEE
15 years 5 months ago
The Future of Enterprise Groupware Applications
: This paper provides a review of groupware technology and products. The purpose of this review is to investigate the appropriateness of current groupware technology as the basis f...
Sotirios Terzis, Paddy Nixon, Vincent P. Wade, Sim...
ACSAC
2000
IEEE
15 years 5 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow