Sciweavers

1010 search results - page 140 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
AUSFORENSICS
2003
13 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
VL
2002
IEEE
124views Visual Languages» more  VL 2002»
14 years 3 months ago
Supporting the Construction of Real World Interfaces
In recent years, real world objects have been used to reflect information previously shown on the computer screen. While most earlier efforts have required significant developer...
D. Scott McCrickard, David Wrighton, Dillon Busser...
IJRR
2002
175views more  IJRR 2002»
13 years 10 months ago
Navigation Strategies for Exploring Indoor Environments
This paper investigates safe and efficient map-building strategies for a mobile robot with imperfect control and sensing. In the implementation, a robot equipped with a range sens...
Héctor H. González-Baños, Jea...
SAC
2004
ACM
14 years 3 months ago
Code generation techniques for developing light-weight XML Web services for embedded devices
This paper presents specialized code generation techniques and runtime optimizations for developing light-weight XML Web services for embedded devices. The optimizations are imple...
Robert van Engelen
SUTC
2006
IEEE
14 years 4 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...