Sciweavers

422 search results - page 72 / 85
» Risk management for distributed authorization
Sort
View
116
Voted
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
15 years 5 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
103
Voted
IPSJ
1994
138views more  IPSJ 1994»
15 years 2 months ago
The TSIMMIS Project: Integration of Heterogeneous Information Sources
The goal of the Tsimmis Project is to develop tools that facilitate the rapid integration of heterogeneous information sources that may include both structured and unstructured da...
Sudarshan S. Chawathe, Hector Garcia-Molina, Joach...
117
Voted
TWC
2008
154views more  TWC 2008»
15 years 17 days ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
110
Voted
SAC
2009
ACM
15 years 7 months ago
Using geo-spatial session tagging for smart multicast session discovery
IP multicast is increasingly seen as efficient mode of live content distribution in the Internet to significantly large subscriber bases. Despite its numerous benefits over IP u...
Piyush Harsh, Richard Newman
SCFBM
2008
143views more  SCFBM 2008»
15 years 4 days ago
LSID Tester, a tool for testing Life Science Identifier resolution services
Background: Life Science Identifiers (LSIDs) are persistent, globally unique identifiers for biological objects. The decentralised nature of LSIDs makes them attractive for identi...
Roderic D. M. Page