Sciweavers

1891 search results - page 243 / 379
» Interactive Analysis of Computer Crimes
Sort
View
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 11 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich
HUC
2007
Springer
15 years 11 months ago
An Exploration of Location Error Estimation
Abstract. Many existing localization systems generate location predictions, but fail to report how accurate the predictions are. This paper explores the effect of revealing the er...
David Dearman, Alex Varshavsky, Eyal de Lara, Khai...
PERVASIVE
2007
Springer
15 years 11 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ICPPW
2006
IEEE
15 years 11 months ago
Grid Resource Allocation and Task Scheduling for Resource Intensive Applications
Evolution of grid has drawn attention from various resource intensive applications addressing domains of bio-informatics, astrology and multimedia, to name a few. Image analysis a...
Abdul Aziz, Hesham El-Rewini
PDCAT
2005
Springer
15 years 10 months ago
Web Media Service based on Streaming Player supporting ubiquitous environment
This paper examines technique of media access that flexible media service, provided user interaction, and guaranteeing QoS. Currently, there are various streaming services, but th...
Sangok Kim, Kanghee Lee, Zhefan Jiang, Sangwook Ki...