Sciweavers

739 search results - page 122 / 148
» Information Flow in Credential Systems
Sort
View
DRM
2009
Springer
14 years 2 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
ICRA
2005
IEEE
97views Robotics» more  ICRA 2005»
14 years 1 months ago
Cognitive Based Neural Prosthetics
– Intense activity in neural prosthetic research has recently demonstrated the possibility of robotic interfaces that respond directly to the nervous system. The question remains...
Richard A. Andersen, Sam Musallam, Joel W. Burdick...
APPT
2005
Springer
14 years 1 months ago
SIP-Based Adaptive Multimedia Transmissions for Wired and Wireless Networks
SIP (Session Initiation Protocol) is a signaling protocol standardized by IETF, aiming to manage the multimedia transmission sessions among different parties. This paper illustrate...
Weijia Jia, Man-Ching Yuen
APN
2004
Springer
13 years 11 months ago
Web Supported Enactment of Petri-Net Based Workflows with XRL/Flower
This paper describes concepts and features of a Web-based system called XRL/flower for carrying out Petri-net based workflows described with XRL (eXchangeable Routing Language). XR...
Alexander Norta
CCS
2006
ACM
13 years 11 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...