Sciweavers

164 search results - page 20 / 33
» Intelligent High-Security Access Control
Sort
View
CORR
2010
Springer
224views Education» more  CORR 2010»
13 years 7 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
DRM
2003
Springer
14 years 25 days ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
GLOBECOM
2008
IEEE
14 years 2 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
ICADL
2004
Springer
161views Education» more  ICADL 2004»
14 years 29 days ago
An Implementation of Web Image Search Engines
This paper presents our implementation techniques for an intelligent Web image search engine. A reference architecture of the system is provided and addressed in this paper. The s...
Zhiguo Gong, Leong Hou U, Chan Wa Cheang
PDPTA
1996
13 years 9 months ago
Performance of a Multiprocessor Multidisk CD-ROM Image Server
Professionals in various elds such as medical imaging, biology, and civil engineering require rapid access to huge amounts of image data. Multimedia interfaces further increase t...
Rolf Muralt, Benoit A. Gennart, Bernard Krummenach...