Sciweavers

1739 search results - page 320 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
ISPA
2005
Springer
15 years 5 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
15 years 5 months ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen
96
Voted
SIGIR
2004
ACM
15 years 5 months ago
A music recommender based on audio features
Many collaborative music recommender systems (CMRS) have succeeded in capturing the similarity among users or items based on ratings, however they have rarely considered about the...
Qing Li, Byeong Man Kim, Donghai Guan, Duk whan Oh
IH
2004
Springer
15 years 5 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
EDOC
2003
IEEE
15 years 5 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...