Sciweavers

2913 search results - page 384 / 583
» How Much to Copy
Sort
View
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
ICDCS
2006
IEEE
14 years 3 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
IJCNN
2006
IEEE
14 years 3 months ago
Recurrent Neural Network Based Predictions of Elephant Migration in a South African Game Reserve
Abstract— A large portion of South Africa’s elephant population can be found on small wildlife reserves. When confined to enclosed reserves the elephant densities are much hig...
Parviz Palangpour, Ganesh K. Venayagamoorthy, Kevi...
IRI
2006
IEEE
14 years 3 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
ISCC
2006
IEEE
123views Communications» more  ISCC 2006»
14 years 3 months ago
WISENEP: A Network Processor for Wireless Sensor Networks
Abstract— Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful l...
Andre Mota, Leonardo B. Oliveira, Felipe F. Rocha,...