Sciweavers

981 search results - page 143 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
CCGRID
2006
IEEE
15 years 7 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
147
Voted
WSE
2002
IEEE
15 years 6 months ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
AGENTS
1998
Springer
15 years 5 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
JCDL
2004
ACM
107views Education» more  JCDL 2004»
15 years 6 months ago
A semi-automated digital preservation system based on semantic web services
This paper describes a Web-services-based system which we have developed to enable organizations to semi-automatically preserve their digital collections by dynamically discoverin...
Jane Hunter, Sharmin Choudhury
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 8 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...