Sciweavers

625 search results - page 89 / 125
» Design and Implementation of a High-Performance Active Netwo...
Sort
View
WISEC
2010
ACM
13 years 9 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
MM
1994
ACM
151views Multimedia» more  MM 1994»
14 years 1 months ago
Distributed Parallel Data Storage Systems: A Scalable Approach to High Speed Image Servers
We have designed, built, and analyzed a distributed parallel storage system that will supply image streams fast enough to permit multi-user, "real-time", video-like appl...
Brian Tierney, Jason Lee, Ling Tony Chen, Hanan He...
OWLED
2007
13 years 10 months ago
Ontology-Based Management of the Telehealth Smart Home, Dedicated to Elderly in Loss of Cognitive Autonomy
Taking care of an elderly in loss of cognitive autonomy is a challenging task. Artificial agents, such as the Telehealth Smart Home (TSH) system can facilitate that task. However,...
Fatiha Latfi, Bernard Lefebvre, Céline Desc...
CCS
2004
ACM
14 years 2 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...