Sciweavers

8087 search results - page 1438 / 1618
» Meta Data Management
Sort
View
EUC
2008
Springer
15 years 6 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
EUROSEC
2008
ACM
15 years 6 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
IESA
2007
15 years 6 months ago
Integration of Job Portals by Meta-search
In the area of Human Resource Management, the trend is towards online exchange of information about human resources. For example, online applications for employment become standar...
J. Dorn, T. Naz
FPL
2008
Springer
175views Hardware» more  FPL 2008»
15 years 6 months ago
File system access from reconfigurable FPGA hardware processes in BORPH
This paper presents the design and implementation of BORPH's kernel file system layer that provides FPGA processes direct access to the general file system. Using a semantics...
Hayden Kwok-Hay So, Robert W. Brodersen
INFOSCALE
2007
ACM
15 years 6 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
« Prev « First page 1438 / 1618 Last » Next »