Sciweavers

963 search results - page 147 / 193
» A Solution for Data Inconsistency in Data Integration
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ADHOCNOW
2008
Springer
14 years 3 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...
STEP
2003
IEEE
14 years 2 months ago
Using Grid Technologies for Web-Enabling Legacy Systems
The adoption of the Internet technologies favors the diffusion of Web and Grid-based applications. However, the development of new applications exploiting the modern interfaces an...
Thierry Bodhuin, Maria Tortorella
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 2 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
BTW
2001
Springer
113views Database» more  BTW 2001»
14 years 1 months ago
Version Propagation in Federated Database Systems
Abstract Integrated engineering environments, based on federated database technology, are, among others, a means to control the integrity of and dependencies between product data c...
Martin Schönhoff, Markus Strässler, Klau...