Sciweavers

936 search results - page 99 / 188
» Context for Ubiquitous Data Management
Sort
View
RAID
2009
Springer
14 years 2 months ago
Brave New World: Pervasive Insecurity of Embedded Network Devices
Abstract. Embedded network devices have become an ubiquitous fixture in the modern home, office as well as in the global communication infrastructure. Devices like routers, NAS ap...
Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore ...
CEC
2005
IEEE
14 years 1 months ago
Parallel evolutionary algorithms on graphics processing unit
Evolutionary Algorithms (EAs) are effective and robust methods for solving many practical problems such as feature selection, electrical circuits synthesis, and data mining. Howeve...
Man Leung Wong, Tien-Tsin Wong, Ka-Ling Fok
ICEIS
2002
IEEE
14 years 1 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
IS
1998
13 years 7 months ago
Information Modeling in the Time of the Revolution
Information modeling is concerned with the construction of computer-based symbol structures which capture the meaning of information and organize it in ways that make it understan...
John Mylopoulos
TMC
2010
89views more  TMC 2010»
13 years 6 months ago
SIP-Based IMS Signaling Analysis for WiMax-3G Interworking Architectures
—The third-generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network-independent IP-based servi...
Arslan Munir, Ann Gordon-Ross