Sciweavers

131 search results - page 3 / 27
» Active Data Protection with Data Journals
Sort
View
CN
2006
87views more  CN 2006»
13 years 7 months ago
Lightweight thread tunnelling in network applications
Abstract. Active Network nodes are increasingly being used for nontrivial processing of data streams. These complex network applications typically benefit from protection between t...
Austin Donnelly
ISCAS
2006
IEEE
180views Hardware» more  ISCAS 2006»
14 years 28 days ago
JPWL - an extension of JPEG 2000 for wireless imaging
—In this paper, we present an overview of the JPWL standardization activity. JPWL is an extension of JPEG 2000 for the efficient transmission of JPEG 2000 images over an error-pr...
Frédéric Dufaux, Giuseppe Baruffa, F...
HICSS
2008
IEEE
215views Biometrics» more  HICSS 2008»
13 years 8 months ago
Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage of Visualization Tools
This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched...
Fernanda B. Viégas, Martin Wattenberg, Matt...
WEBI
2004
Springer
14 years 7 days ago
Self-Protection of Web Content
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Hoi Chan, Trieu C. Chieu
MHCI
2009
Springer
14 years 1 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi