Sciweavers

11594 search results - page 2212 / 2319
» Cooperation in Service Systems
Sort
View
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
ICICS
2005
Springer
14 years 2 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ICN
2005
Springer
14 years 2 months ago
Load Distribution Performance of the Reliable Server Pooling Framework
Abstract. The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by prov...
Thomas Dreibholz, Erwin P. Rathgeb, Michael Tü...
ASPLOS
2004
ACM
14 years 2 months ago
An ultra low-power processor for sensor networks
We present a novel processor architecture designed specifically for use in low-power wireless sensor-network nodes. Our sensor network asynchronous processor (SNAP/LE) is based on...
Virantha N. Ekanayake, Clinton Kelly IV, Rajit Man...
ECWEB
2004
Springer
179views ECommerce» more  ECWEB 2004»
14 years 2 months ago
Applying Text Mining on Electronic Messages for Competitive Intelligence
This paper presents how text -mining techniques can be used to analyze an enterprise’s external environment searching for competitors, related products and services, marketing st...
José Palazzo Moreira de Oliveira, Stanley L...
« Prev « First page 2212 / 2319 Last » Next »