Sciweavers

2187 search results - page 324 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
DPD
2007
86views more  DPD 2007»
13 years 9 months ago
Semantics based customization of UBL document schemas
Abstract. Universal Business Language (UBL) is an OASIS initiative to develop common business document schemas to provide document interoperability in the eBusiness domain. Since t...
Yalin Yarimagan, Asuman Dogac
EUROMICRO
2004
IEEE
14 years 1 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
DRM
2004
Springer
14 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
SENSYS
2003
ACM
14 years 2 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
INFOCOM
2009
IEEE
14 years 3 months ago
iPASS: Incentivized Peer-Assisted System for Asynchronous Streaming
Abstract— As an efficient distribution mechanism, peer-topeer technology has become a tremendously attractive solution to offload servers in large scale video streaming applica...
Chao Liang, Zhenghua Fu, Yong Liu, Chai Wah Wu