Sciweavers

1845 search results - page 302 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
SEMWEB
2009
Springer
15 years 6 months ago
Reasoning With Provenance, Trust and all that other Meta Knowlege in OWL
Abstract—For many tasks, such as the integration of knowledge bases in the semantic web, one must not only handle the knowledge itself, but also characterizations of this knowled...
Simon Schenk, Renata Queiroz Dividino, Steffen Sta...
ACSAC
2000
IEEE
15 years 5 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
ACSAC
2000
IEEE
15 years 5 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
ICMCS
2000
IEEE
116views Multimedia» more  ICMCS 2000»
15 years 5 months ago
A DCT Domain Visible Watermarking Technique for Images
The growth of computer networks has boosted the growth of the information technology sector to a greater extent. There is a trend to move from conventional libraries to digital li...
Saraju P. Mohanty, K. R. Ramakrishnan, Mohan S. Ka...
HOTOS
1999
IEEE
15 years 5 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...