Sciweavers

1061 search results - page 190 / 213
» Integrity Constraints for Linked Data
Sort
View
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
14 years 3 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
AMFG
2005
IEEE
256views Biometrics» more  AMFG 2005»
14 years 3 months ago
Robust Facial Landmark Detection for Intelligent Vehicle System
Abstract. This paper presents an integrated approach for robustly locating facial landmark for drivers. In the first step a cascade of probability learners is used to detect the f...
Junwen Wu, Mohan M. Trivedi
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 3 months ago
XML Based Robust Client-Server Communication for a Distributed Telecommunication Management System
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
Karl M. Göschka, Helmut Reis, Robert Smeikal
SAC
2009
ACM
14 years 2 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
IEEEPACT
2000
IEEE
14 years 2 months ago
aSOC: A Scalable, Single-Chip Communications Architecture
As on-chip integration matures, single-chip system designers must not only be concerned with component-level issues such as performance and power, but also with onchip system-leve...
Jian Liang, Sriram Swaminathan, Russell Tessier