Sciweavers

182 search results - page 33 / 37
» Information Flow in Disaster Management Systems
Sort
View
HICSS
2005
IEEE
77views Biometrics» more  HICSS 2005»
14 years 1 months ago
Towards a Theory of Value Latency for IT Investments
Multiple studies in the information systems (IS) literature recognize that information technology (IT) investments may not yield immediate returns. Nevertheless, there has been a ...
Kim Huat Goh, Robert J. Kauffman
BIOADIT
2006
Springer
13 years 11 months ago
MOVE Processors That Self-replicate and Differentiate
Abstract. This article describes an implementation of a basic multiprocessor system that exhibits replication and differentiation abilities on the POEtic tissue, a programmable har...
Joël Rossier, Yann Thoma, Pierre-André...
SACMAT
2006
ACM
14 years 1 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
APPT
2005
Springer
14 years 28 days ago
SIP-Based Adaptive Multimedia Transmissions for Wired and Wireless Networks
SIP (Session Initiation Protocol) is a signaling protocol standardized by IETF, aiming to manage the multimedia transmission sessions among different parties. This paper illustrate...
Weijia Jia, Man-Ching Yuen
DRM
2009
Springer
14 years 1 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...