Sciweavers

6164 search results - page 861 / 1233
» Teaching Computer Security
Sort
View
PDP
2007
IEEE
15 years 11 months ago
Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations
Heterogeneous networks of workstations have rapidly become a cost-effective computing solution in many application areas. This paper develops several highly innovative parallel al...
Antonio Plaza, David Valencia, Soraya Blazquez, Ja...
STACS
2007
Springer
15 years 11 months ago
Associative-Commutative Deducibility Constraints
We consider deducibility constraints, which are equivalent to particular Diophantine systems, arising in the automatic verification of security protocols, in presence of associati...
Sergiu Bursuc, Hubert Comon-Lundh, Stéphani...
SKG
2006
IEEE
15 years 11 months ago
A Semantic-based Meteorology Grid Service Registry, Discovery and Composition Framework
Meteorology Grid Computing aims to provide scientist with seamless, reliable, secure and inexpensive access to meteorological resources. In this paper, we presented a semantic-bas...
Kaijun Ren, Nong Xiao, Junqiang Song, Weimin Zhang...
AINA
2005
IEEE
15 years 10 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
AVSS
2005
IEEE
15 years 10 months ago
VidMAP: video monitoring of activity with Prolog
This paper describes the architecture of a visual surveillance system that combines real time computer vision algorithms with logic programming to represent and recognize activiti...
Vinay D. Shet, David Harwood, Larry S. Davis