Sciweavers

14824 search results - page 2734 / 2965
» Security - Introduction
Sort
View
121
Voted
FUIN
2007
99views more  FUIN 2007»
15 years 2 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
MTA
2006
125views more  MTA 2006»
15 years 2 months ago
QCWS: an implementation of QoS-capable multimedia web services
QoS, that defines service quality such as latency, availability, timeliness and reliability, is important for web applications that provide real-time information, multimedia conte...
Tao Yu, Kwei-Jay Lin
139
Voted
PERVASIVE
2008
Springer
15 years 2 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
132
Voted
NETWORK
2006
96views more  NETWORK 2006»
15 years 2 months ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
126
Voted
NETWORK
2006
290views more  NETWORK 2006»
15 years 2 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
« Prev « First page 2734 / 2965 Last » Next »