Sciweavers

1690 search results - page 309 / 338
» A Security Framework for JXTA-Overlay
Sort
View
COMPSEC
2004
95views more  COMPSEC 2004»
13 years 7 months ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis
DEBU
2000
90views more  DEBU 2000»
13 years 7 months ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner
ICPR
2010
IEEE
13 years 6 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
IPMU
2010
Springer
13 years 5 months ago
See-Through Vision: A Visual Augmentation Method for Sensing-Web
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...
Yuichi Ohta, Yoshinari Kameda, Itaru Kitahara, Mas...
PERCOM
2010
ACM
13 years 5 months ago
Exploring quality in multisensor pervasive systems - a localization case study
This paper addresses quality vs. cost tradeoffs in multisensor pervasive spaces. Specifically, we focus on a case study that uses location sensing in instrumented pervasive spaces ...
Stefano Bonetti, Sharad Mehrotra, Nalini Venkatasu...