Sciweavers

2281 search results - page 277 / 457
» Security Patterns and Secure Systems Design
Sort
View
JCIT
2010
130views more  JCIT 2010»
14 years 10 months ago
Research on Simulation and Optimization of Transshipment Port Operation in a Power Coal Ocean Shipping Logistics System on the B
With China's rapid economic development, electricity supply is relatively shortage, and the contradiction of power coal supply and demand is prominent. In this context, using...
Yabin Li
ICCSA
2009
Springer
15 years 10 months ago
ODDUGI: Ubiquitous Mobile Agent System
A mobile agent is regarded as an attractive technology when developing distributed applications in mobile and ubiquitous computing environments. In this paper, we present ODDUGI, a...
SungJin Choi, Hyunseung Choo, MaengSoon Baik, Hong...
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 10 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
NDSS
1998
IEEE
15 years 8 months ago
On the Problem of Trust in Mobile Agent Systems
Systems that support mobile agents are increasingly being used on the global Internet. Security concerns dealing with the protection of the execution environment from malicious ag...
Uwe G. Wilhelm, Sebastian Staamann, Levente Butty&...
ACIVS
2005
Springer
15 years 9 months ago
Designing Area and Performance Constrained SIMD/VLIW Image Processing Architectures
Abstract. Image processing is widely used in many applications, including medical imaging, industrial manufacturing and security systems. In these applications, the size of the ima...
Hamed Fatemi, Henk Corporaal, Twan Basten, Richard...