Sciweavers

5386 search results - page 20 / 1078
» Approaches to Multimedia and Security
Sort
View
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 11 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
ITCC
2002
IEEE
14 years 2 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
IPPS
2005
IEEE
14 years 3 months ago
A Cross-Layer Approach for Power-Performance Optimization in Distributed Mobile Systems
The next generation of mobile systems with multimedia processing capabilities and wireless connectivity will be increasingly deployed in highly dynamic and distributed environment...
Shivajit Mohapatra, Radu Cornea, Hyunok Oh, Kyoung...
WCE
2007
13 years 11 months ago
A Personalized Multimedia Web-Based Educational System with Automatic Indexing for Multimedia Courses
— This paper proposes a personalized web-based system with evolving automatic indexing that may be used in multimedia courses. Instructors may use the system to create and delive...
O. Shata
CORR
2006
Springer
133views Education» more  CORR 2006»
13 years 9 months ago
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract. In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requiremen...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck