Sciweavers

3474 search results - page 601 / 695
» Data Management in RFID Applications
Sort
View
IEEEIAS
2008
IEEE
15 years 10 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
CLUSTER
2007
IEEE
15 years 10 months ago
Non-collective parallel I/O for global address space programming models
— Achieving high performance for out-of-core applications typically involves explicit management of the movement of data between the disk and the physical memory. We are developi...
Sriram Krishnamoorthy, Juan Piernas, Vinod Tippara...
COMSWARE
2007
IEEE
15 years 10 months ago
RAT: Routing by Adaptive Targeting in Wireless Sensor/Actor Networks
— Wireless sensor networks have attracted significant interest for various scientific, military, and e-health applications. Recently a new class of sensor networks “sensor/ac...
Ghalib A. Shah, Muslim Bozyigit, Demet Aksoy
ICIW
2007
IEEE
15 years 10 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Video Copy Detection on the Internet: The Challenges of Copyright and Multiplicity
This paper presents applications for dealing with videos on the web, using an efficient technique for video copy detection in large archives. Managing videos on the web is the so...
Julien Law-To, Valérie Gouet-Brunet, Olivie...