Sciweavers

1302 search results - page 152 / 261
» From Liveness to Promptness
Sort
View
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
15 years 11 months ago
Of Paper Trails and Voter Receipts
The Internet pervades virtually every aspect of our daily lives, and it seems there is no area that is immune from computing solutions. Computers can do things faster, with greate...
Alec Yasinsac, Matt Bishop
HOST
2008
IEEE
15 years 11 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
ICC
2008
IEEE
168views Communications» more  ICC 2008»
15 years 11 months ago
A Balanced Tree-Based Strategy for Unstructured Media Distribution in P2P Networks
—Most research on P2P multimedia streaming assumes that users access video content sequentially and passively. Unlike P2P live streaming in which the peers start playback from th...
Changqiao Xu, Gabriel-Miro Muntean, Enda Fallon, A...
AINA
2007
IEEE
15 years 10 months ago
Sensor/Actuator Networks in Smart Homes for Supporting Elderly and Handicapped People
Abstract—Smart Home, this term comprises various approaches, engaged in living and working now and in the future. The objectives of the various approaches range from enhancing co...
Sebastian Dengler, Abdalkarim Awad, Falko Dressler
CNSR
2007
IEEE
122views Communications» more  CNSR 2007»
15 years 10 months ago
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology
Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smo...
Ebrahim Bagheri, Ali A. Ghorbani