Sciweavers

3544 search results - page 673 / 709
» Information Security in Open Systems
Sort
View
PERVASIVE
2006
Springer
14 years 10 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
SIGKDD
2008
149views more  SIGKDD 2008»
14 years 10 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
SIGOPS
2008
156views more  SIGOPS 2008»
14 years 10 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
IJNSEC
2007
164views more  IJNSEC 2007»
14 years 10 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
TSMC
2008
172views more  TSMC 2008»
14 years 10 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank