Sciweavers

2310 search results - page 264 / 462
» Managing System and Active-Content Integrity
Sort
View
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 1 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
DEBS
2007
ACM
14 years 2 days ago
A system for semantic data fusion in sensor networks
Emerging sensor network technologies are expected to substantially augment applications such as environmental monitoring, health-care, and home/commercial automation. However, muc...
Alex Wun, Milenko Petrovic, Hans-Arno Jacobsen
DBSEC
2007
128views Database» more  DBSEC 2007»
13 years 9 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
HICSS
2010
IEEE
235views Biometrics» more  HICSS 2010»
14 years 3 months ago
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy
Organizations invest in the development of knowledge repositories (KR) to foster knowledge reuse and integration. Yet many KR initiatives fail to meet expectations, in part becaus...
Alexandra Durcikova, Kelly J. Fadel
ICSM
2000
IEEE
14 years 16 days ago
A Deployment System for Pervasive Computing
Software has for a long time been used for controlling different systems. Today, there is a trend towards integrating software into consumer electronics, home appliances, cars etc...
Jesper Andersson