Sciweavers

108 search results - page 17 / 22
» Continuous authentication on relational streams
Sort
View
AVI
2004
13 years 9 months ago
CircleView: a new approach for visualizing time-related multidimensional data sets
This paper introduces a new approach for visualizing multidimensional time-referenced data sets, called Circle View. The Circle View technique is a combination of hierarchical vis...
Daniel A. Keim, Jörn Schneidewind, Mike Sips
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
14 years 2 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 7 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
14 years 1 months ago
A DRM Architecture for Manageable P2P Based IPTV System
With the improvement of network bandwidth, multimedia services based on streaming live media have gained much attention recently, among which IPTV has become a hot topic. After em...
Xiaoyun Liu, Tiejun Huang, Longshe Huo, Luntian Mo...
ECIS
2001
13 years 9 months ago
Towards a theory of architectural knowledge integration capability: A test of an empirical model in e-business project teams
Knowledge is now recognized as the key differentiating resource among firms. The ability to integrate widely held knowledge to derive new products and services constitutes a meta-...
Amrit Tiwana, Ephraim R. McLean