Sciweavers

492 search results - page 29 / 99
» Encrypted Shared Data Spaces
Sort
View
CCS
1994
ACM
13 years 11 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
ACISICIS
2009
IEEE
14 years 2 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
JUCS
2010
164views more  JUCS 2010»
13 years 6 months ago
On Sustainability of Context-Aware Services Among Heterogeneous Smart Spaces
Abstract: Most of ambient intelligence studies have tried to employ inductive methods (e.g., data mining) to discover useful information and patterns from data streams on sensor ne...
Jason J. Jung
HUC
2007
Springer
14 years 1 months ago
Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments
Domestic technologies have been a popular area of study for ubiquitous computing researchers, however there is relatively little recent data on how families currently use and share...
A. J. Bernheim Brush, Kori M. Inkpen
EGITALY
2006
13 years 9 months ago
3D Data Segmentation Using a Non-Parametric Density Estimation Approach
In this paper, a new segmentation approach for sets of 3D unorganized points is proposed. The method is based on a clustering procedure that separates the modes of a non-parametri...
Umberto Castellani, Marco Cristani, Vittorio Murin...