Sciweavers

2560 search results - page 409 / 512
» Securing VO Management
Sort
View
WWW
2008
ACM
16 years 5 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
CHI
2005
ACM
16 years 4 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
VLDB
2001
ACM
119views Database» more  VLDB 2001»
16 years 4 months ago
PicoDBMS: Scaling down database techniques for the smartcard
Smartcards are the most secure portable computing device today. They have been used successfully in applications involving money, proprietary and personal data (such as banking, h...
Philippe Pucheral, Luc Bouganim, Patrick Valduriez...
IEEECIT
2009
IEEE
15 years 11 months ago
Dynamic Software Product Lines for Service-Based Systems
—Ageing populations and the necessity to reduce environmental impact raise new challenges on our living buildings. Convergence of home control systems (air conditioning, light ma...
Paul Istoan, Grégory Nain, Gilles Perrouin,...
ICPADS
2008
IEEE
15 years 10 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...