Sciweavers

762 search results - page 74 / 153
» Modeling and Simulating Information Security Management
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
CONTEXT
2007
Springer
14 years 1 months ago
Improving LSA by expanding the contexts
Latent Semantic Analysis is used in many research fields with several applications of classifications. We propose to improve LSA with additional semantic information found with s...
Nicolas Béchet, Mathieu Roche, Jacques Chau...
IDEAS
2003
IEEE
171views Database» more  IDEAS 2003»
14 years 1 months ago
Dynamic Data Management for Location Based Services in Mobile Environments
We characterize the dynamic data management problem for location based services(LBS) in mobile environments and devise a cost model for servicing both location independent and loc...
Shiow-yang Wu, Kun-Ta Wu
IAT
2006
IEEE
14 years 1 months ago
A Storage Management for Mining Object Moving Patterns in Object Tracking Sensor Networks
One promising application of sensor networks is object tracking. Because the movements of the tracked objects usually show repeating patterns, we propose a heterogeneous tracking ...
Chih-Chieh Hung, Wen-Chih Peng
MSWIM
2005
ACM
14 years 1 months ago
Cellular universal IP: a low delay mobility scheme based on universal IP addressing
The concept of care-of-address (CoA) is a major cause of excessive handoff delay in Mobile IPv6 for real time multimedia traffic. Many schemes eliminate the use of CoA at the micr...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee