Sciweavers

303 search results - page 45 / 61
» Sensor Integration in the Security Domain
Sort
View
OOPSLA
2001
Springer
15 years 2 months ago
The Java Syntactic Extender
The ability to extend a language with new syntactic forms is a powerful tool. A sufficiently flexible macro system allows programmers to build from a common base towards a langua...
Jonathan Bachrach, Keith Playford
BIOSURVEILLANCE
2007
Springer
15 years 3 months ago
High Performance Computing for Disease Surveillance
Abstract. The global health, threatened by emerging infectious diseases, pandemic influenza, and biological warfare, is becoming increasingly dependent on the rapid acquisition, p...
David W. Bauer, Brandon W. Higgs, Mojdeh Mohtashem...
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
15 years 3 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian
CONEXT
2008
ACM
14 years 11 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
ACSAC
2006
IEEE
15 years 3 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...