Sciweavers

981 search results - page 160 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
15 years 5 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
BMCBI
2010
160views more  BMCBI 2010»
14 years 8 months ago
eHive: An Artificial Intelligence workflow system for genomic analysis
Background: The Ensembl project produces updates to its comparative genomics resources with each of its several releases per year. During each release cycle approximately two week...
Jessica Severin, Kathryn Beal, Albert J. Vilella, ...
ICWS
2003
IEEE
15 years 2 months ago
A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Abstract Providing network infrastructure for authentication, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over t...
H. T. Kung, F. Zhu, M. Iansiti
ICPP
2005
IEEE
15 years 7 months ago
Service Migration in Distributed Virtual Machines for Adaptive Grid Computing
Computational grids can integrate geographically distributed resources into a seamless environment. To facilitate managing these heterogenous resources, the virtual machine gy pro...
Song Fu, Cheng-Zhong Xu
MOBISYS
2008
ACM
16 years 1 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...