Sciweavers

118 search results - page 10 / 24
» Efficient fingerprint-based user authentication for embedded...
Sort
View
PDPTA
2004
13 years 9 months ago
Agent-Based Embedded Monitoring System for Ubiquitous Networks Environments
Contrary to current wireless network systems, ubiquitous network environment has quite dynamic and diversified devices which aim at best meeting the requirements of specific group ...
Hyo-Sung Kang, Jong-Mu Choi, Jai-Hoon Kim, Young-B...
IJIT
2004
13 years 9 months ago
A System for Performance Evaluation of Embedded Software
Developers need to evaluate software's performance to make software efficient. This paper suggests a performance evaluation system for embedded software. The suggested system ...
Yong-Yoon Cho, Jong-Bae Moon, Young-Chul Kim
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 1 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 1 months ago
Developing Analytic, Cognitive and Linguistic Skills with an Electronic Negotiation System
An increasing number of Web-based systems, including brainstorming, decision-making, and negotiation support systems, are being developed to aid users in solving particular types ...
Margaret J. Kersten, Marlene Haley, Gregory E. Ker...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 11 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...