Sciweavers

5386 search results - page 92 / 1078
» Approaches to Multimedia and Security
Sort
View
MPC
1998
Springer
81views Mathematics» more  MPC 1998»
14 years 3 months ago
A Semantic Approach to Secure Information Flow
K. Rustan M. Leino, Rajeev Joshi
VLDB
1994
ACM
120views Database» more  VLDB 1994»
14 years 3 months ago
An Approach for Building Secure Database Federations
Dirk Jonscher, Klaus R. Dittrich
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
14 years 28 days ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
ICASSP
2010
IEEE
13 years 11 months ago
Gradient descent approach for secure localization in resource constrained wireless sensor networks
Many sensor network related applications require precise knowledge of the location of constituent nodes. In these applications, it is desirable for the wireless nodes to be able t...
Ravi Garg, Avinash L. Varna, Min Wu
AICOM
2008
51views more  AICOM 2008»
13 years 11 months ago
To secure an anchor - a recovery planning approach to ambiguity in perceptual anchoring
Lars Karlsson, Abdelbaki Bouguerra, Mathias Broxva...