Sciweavers

601 search results - page 105 / 121
» Embedding Robots into the Internet
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
14 years 9 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
VLDB
2002
ACM
165views Database» more  VLDB 2002»
14 years 9 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
IAJIT
2010
112views more  IAJIT 2010»
14 years 8 months ago
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information
: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Security has always been a major concern since time im...
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
TPDS
2010
103views more  TPDS 2010»
14 years 7 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
141
Voted
VL
2010
IEEE
196views Visual Languages» more  VL 2010»
14 years 7 months ago
Smart Objects for Intelligent Applications - ADK
SOFIA (Artemis project: http://www.sofiaproject.eu/) focuses on answering the challenge of creating smart environments and its goal is to make information that resides in the phys...
Jesus Fernandez Gomez-Pimpollo, Raul Otaolea