Sciweavers

1845 search results - page 129 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
113
Voted
CCS
2006
ACM
15 years 5 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
CN
2007
115views more  CN 2007»
15 years 1 months ago
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
The proliferation of heterogeneous devices and diverse networking technologies demands flexible models to guarantee the quality-of-service(QoS) at the application session level, ...
Hanping Lufei, Weisong Shi
WWW
2004
ACM
16 years 2 months ago
Visualising student tracking data to support instructors in web-based distance education
This paper presents a novel approach of using web log data generated by course management systems (CMS) to help instructors become aware of what is happening in distance learning ...
Riccardo Mazza, Vania Dimitrova
142
Voted
HOTI
2005
IEEE
15 years 7 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
PREMI
2007
Springer
15 years 8 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron