Sciweavers

881 search results - page 95 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
MINENET
2006
ACM
15 years 8 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
IJIEM
2007
113views more  IJIEM 2007»
15 years 1 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
MOBICOM
2009
ACM
15 years 8 months ago
Data fusion improves the coverage of wireless sensor networks
Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important performance mea...
Guoliang Xing, Rui Tan, Benyuan Liu, Jianping Wang...
ICRA
2010
IEEE
195views Robotics» more  ICRA 2010»
15 years 14 days ago
Cooperative tracking of moving objects and face detection with a dual camera sensor
— This paper describes a sensor for autonomous surveillance capable of continuously monitoring the environment, while acquiring detailed images of specific areas. This is achiev...
Stefano Ghidoni, Alberto Pretto, Emanuele Menegatt...
ICST
2009
IEEE
15 years 8 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya