Sciweavers

107 search results - page 7 / 22
» Re-Examining the Use of Network-on-Chip as Test Access Mecha...
Sort
View
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 13 days ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
WWW
2008
ACM
14 years 8 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
COMPSAC
2007
IEEE
13 years 11 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
INFOCOM
2010
IEEE
13 years 6 months ago
DiffProbe: Detecting ISP Service Discrimination
Abstract—We propose an active probing method, called Differential Probing or DiffProbe, to detect whether an access ISP is deploying forwarding mechanisms such as priority schedu...
Partha Kanuparthy, Constantine Dovrolis
ERCIMDL
2011
Springer
236views Education» more  ERCIMDL 2011»
12 years 7 months ago
Transformation of a Keyword Indexed Collection into a Semantic Repository: Applicability to the Urban Domain
In the information retrieval context, resource collections are frequently classified using thesauri. However, the limited semantics provided by thesauri restricts the collection s...
Javier Lacasta, Javier Nogueras-Iso, Jacques Telle...