Sciweavers

674 search results - page 92 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
TASLP
2002
84views more  TASLP 2002»
13 years 7 months ago
Maximum likelihood multiple subspace projections for hidden Markov models
The first stage in many pattern recognition tasks is to generate a good set of features from the observed data. Usually, only a single feature space is used. However, in some compl...
Mark J. F. Gales
UCS
2007
Springer
14 years 1 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
APNOMS
2007
Springer
14 years 1 months ago
Providing Consistent Service Levels in IP Networks
Abstract. The use of Internet as an ubiquitous communication platform puts a strong demand on service providers regarding the assurance of multiple service levels consistently. Des...
Solange Rito Lima, Pedro Sousa, Paulo Carvalho
WOB
2004
103views Bioinformatics» more  WOB 2004»
13 years 9 months ago
An I/O Device Driver for Bioinformatics Tools: the case for BLAST
There are many bioinformatics tools that deal with input/ output (I/O) issues by using filing systems from the most common operating systems, such as Linux or MS Windows. However, ...
Renato Mauro, Sérgio Lifschitz
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
14 years 7 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...