Sciweavers

1663 search results - page 51 / 333
» Computer Security in the Real World
Sort
View
USS
2008
13 years 11 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
AUTONOMICS
2008
ACM
13 years 10 months ago
MWM: a map-based world model for wireless sensor networks
A prominent functionality of a Wireless Sensor Network (WSN) is environmental monitoring. For this purpose the WSN creates a model for the real world by using abstractions to pars...
Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Aya...
CVPR
2007
IEEE
14 years 10 months ago
Change Detection in a 3-d World
This paper examines the problem of detecting changes in a 3-d scene from a sequence of images, taken by cameras with arbitrary but known pose. No prior knowledge of the state of n...
Thomas Pollard, Joseph L. Mundy
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 17 days ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
ECIS
2000
13 years 10 months ago
Modelling in the Digital World - An Anti-Realist Perspective
This paper considers how we are constructing and modelling digital realities, and considers the relationships between digital realities and our reality using concepts from traditio...
Matthew J. Dovey