Sciweavers

3544 search results - page 547 / 709
» Information Security in Open Systems
Sort
View
PET
2010
Springer
15 years 3 months ago
How to Share Your Favourite Search Results while Preserving Privacy and Quality
Personalised social search is a promising avenue to increase the relevance of search engine results by making use of recommendations made by friends in a social network. More gener...
George Danezis, Tuomas Aura, Shuo Chen, Emre Kicim...
BIOSURVEILLANCE
2008
Springer
15 years 1 months ago
Integrating a Commuting Model with the Bayesian Aerosol Release Detector
The Bayesian Aerosol Release Detector (BARD) is a biosurveillance system for detecting and characterizing disease outbreaks caused by aerosol releases of anthrax. A major challenge...
Aurel Cami, Garrick L. Wallstrom, William R. Hogan
LISA
2001
15 years 19 days ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
VRST
2009
ACM
15 years 5 months ago
Standalone edge-based markerless tracking of fully 3-dimensional objects for handheld augmented reality
This paper presents a markerless tracking technique targeted to the Windows Mobile Pocket PC platform. The primary aim of this work is to allow the development of standalone augme...
João Paulo S. M. Lima, Veronica Teichrieb, ...
SACMAT
2009
ACM
15 years 5 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger