Sciweavers

183 search results - page 27 / 37
» P Systems with String Objects and with Communication by Requ...
Sort
View
GRID
2005
Springer
15 years 3 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...
NGC
2000
Springer
101views Communications» more  NGC 2000»
14 years 10 months ago
Information Access in Multimedia Databases Based on Feature Models
With the increasing popularity of the WWW, the main challenge in computer science has become content-based retrieval of multimedia objects. Access to multimedia objects in database...
Arjen P. de Vries, Menzo Windhouwer, Peter M. G. A...
ISCC
1999
IEEE
127views Communications» more  ISCC 1999»
15 years 2 months ago
A Modular Location-Aware Service and Application Platform
Location-Aware applications for supporting the mobile user as well as logistics of movable objects have proven significant relevance for future telecommunication and computing. Ba...
Tom Pfeifer, Radu Popescu-Zeletin
85
Voted
CCS
2003
ACM
15 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
HPCC
2005
Springer
15 years 3 months ago
A SMS Based Ubiquitous Home Care System
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Tae-Seok Lee, Yuan Yang, Myong-Soon Park