Sciweavers

3349 search results - page 626 / 670
» Data Security
Sort
View
CACM
2000
158views more  CACM 2000»
13 years 9 months ago
Wireless Integrated Network Sensors
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring, and safety...
Gregory J. Pottie, William J. Kaiser
EL
2002
181views more  EL 2002»
13 years 9 months ago
Aspects of networking in multiplayer computer games
Distributed, real-time multiplayer computer games (MCGs) are in the vanguard of utilizing the networking possibilities. Although related research have been done in military simulat...
Jouni Smed, Timo Kaukoranta, Harri Hakonen
JEI
2002
152views more  JEI 2002»
13 years 9 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
IJIEM
2010
171views more  IJIEM 2010»
13 years 8 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
PVLDB
2010
129views more  PVLDB 2010»
13 years 8 months ago
AXART - Enabling Collaborative Work with AXML Artifacts
The workflow models have been essentially operation-centric for many years, ignoring almost completely the data aspects. Recently, a new paradigm of data-centric workflows, call...
Bogdan Marinoiu, Serge Abiteboul, Pierre Bourhis, ...