Sciweavers

3003 search results - page 489 / 601
» Software Security: Building Security In
Sort
View
COLCOM
2005
IEEE
15 years 10 months ago
On-demand overlay networking of collaborative applications
We propose a new overlay network, called Generic Identifier Network (GIN), for collaborative nodes to share objects with transactions across affiliated organizations by merging th...
Cheng-Jia Lai, Richard R. Muntz
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
15 years 10 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 10 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
15 years 10 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
ICMCS
2005
IEEE
141views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Events Detection for an Audio-Based Surveillance System
The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems ai...
Chloé Clavel, Thibaut Ehrette, Gaël Ri...