Sciweavers

1462 search results - page 280 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
COMCOM
2008
76views more  COMCOM 2008»
13 years 6 months ago
A study of self-organization mechanisms in ad hoc and sensor networks
Self-organization is a great concept for building scalable systems consisting of a huge number of subsystems. The primary objectives are improved scalability and dynamic adaptatio...
Falko Dressler
TKDE
1998
100views more  TKDE 1998»
13 years 6 months ago
Scalability Analysis of Declustering Methods for Multidimensional Range Queries
E cient storage and retrieval of multi-attribute datasets have become one of the essential requirements for many data-intensive applications. The Cartesian product le has been kno...
Bongki Moon, Joel H. Saltz
UAIS
2008
172views more  UAIS 2008»
13 years 6 months ago
Recent developments in visual sign language recognition
Abstract Research in the field of sign language recognition has made significant advances in recent years. The present achievements provide the basis for future applications with t...
Ulrich von Agris, Jörg Zieren, Ulrich Canzler...
LAWEB
2009
IEEE
14 years 1 months ago
Policy Based Protection and Personalized Generation of Web Content
Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 10 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer