Sciweavers

772 search results - page 83 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
OTM
2005
Springer
14 years 2 months ago
Event Broker Grids with Filtering, Aggregation, and Correlation for Wireless Sensor Data
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
Eiko Yoneki
IADIS
2009
13 years 7 months ago
Diabetes patients' care based on mobile monitoring
In this paper, we propose a new architecture for diabetes patients. These applications allow the monitoring, patient selfcontrol and communication between patient and doctor. More...
Vladimir Villarreal, José Bravo, Ramó...
WOA
2010
13 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
NETWORK
2007
100views more  NETWORK 2007»
13 years 8 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
COMPCON
1994
IEEE
14 years 1 months ago
An Overview of the Spring System
Spring is a highly modular, distributed, object-oriented operating system. This paper describes the goals of the Spring system and provides overviews of the Spring object model, t...
James G. Mitchell, Jonathan Gibbons, Graham Hamilt...