Sciweavers

14824 search results - page 2508 / 2965
» Security - Introduction
Sort
View
CBMS
2008
IEEE
15 years 11 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
CCGRID
2008
IEEE
15 years 11 months ago
Peer-to-Peer Desktop Grids in the Real World: The ShareGrid Project
ShareGrid is a peer-to-peer desktop grid aimed at satisfying the computing needs of the small research laboratories located in the Piedmont area in Northern Italy. ShareGrid adopt...
Cosimo Anglano, Massimo Canonico, Marco Guazzone, ...
CDC
2008
IEEE
136views Control Systems» more  CDC 2008»
15 years 11 months ago
Distributed hypothesis testing with a fusion center: The conditionally dependent case
Abstract— The paper deals with decentralized Bayesian detection with M hypotheses, and N sensors making conditionally correlated measurements regarding these hypotheses. Each sen...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CEC
2008
IEEE
15 years 11 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
CEC
2008
IEEE
15 years 11 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
« Prev « First page 2508 / 2965 Last » Next »