Sciweavers

2363 search results - page 368 / 473
» How Secure is RFID
Sort
View
MMS
2006
15 years 4 months ago
Information assimilation framework for event detection in multimedia surveillance systems
Most multimedia surveillance and monitoring systems nowadays utilize multiple types of sensors to detect events of interest as and when they occur in the environment. However, due...
Pradeep K. Atrey, Mohan S. Kankanhalli, Ramesh Jai...
PE
2006
Springer
114views Optimization» more  PE 2006»
15 years 4 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
JNW
2007
113views more  JNW 2007»
15 years 4 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
COMPUTER
1999
108views more  COMPUTER 1999»
15 years 4 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
154
Voted
IEEESP
2010
126views more  IEEESP 2010»
15 years 3 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik