Sciweavers

783 search results - page 94 / 157
» Evaluating impact of manageability features on device perfor...
Sort
View
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
SIGUCCS
2003
ACM
14 years 1 months ago
Deep in budget restraints: return on investment (ROI)
The University of Missouri–Columbia’s Information and Access Technology (IAT) Services division’s InfoTech Training department measures IT training using the return on inves...
Terry Robb, Joleen Pfefer
CAIP
2009
Springer
325views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation
This paper investigates a new automated personal authentication technique using finger-knuckle-print (FKP) imaging. First, a specific data acquisition device is developed to captur...
Lin Zhang, Lei Zhang, David Zhang
SEM
2004
Springer
14 years 1 months ago
Towards the Development of Ubiquitous Middleware Product Lines
Abstract. Ubiquitous computing is a challenge for the design of middleware. The reasons are resource constraints, mobility, heterogeneity, etc., just to name a few. We argue that s...
Sven Apel, Klemens Böhm
ICCCN
2008
IEEE
14 years 2 months ago
Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks
—Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use norm...
Peter Djalaliev, Muhammad Jamshed, Nicholas Farnan...