Sciweavers

2927 search results - page 92 / 586
» Secure Distributed Human Computation
Sort
View
IPPS
2003
IEEE
14 years 2 months ago
Parallelisation of IBD Computation for Determining Genetic Disease Map
A number of software packages are available for the construction of comprehensive human genetic maps. In this paper we parallelize the widely used package Genehunter. We restrict ...
Nouhad J. Rizk
ICPADS
2005
IEEE
14 years 2 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
ISWC
2000
IEEE
14 years 1 months ago
Finding Location Using Omnidirectional Video on a Wearable Computing Platform
In this paper we present a framework for a navigation system in an indoor environment using only omnidirectional video. Within a Bayesian framework we seek the appropriate place a...
Wasinee Rungsarityotin, Thad Starner
ICDCSW
2005
IEEE
14 years 2 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
MDM
2005
Springer
127views Communications» more  MDM 2005»
14 years 2 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis