Sciweavers

11603 search results - page 2222 / 2321
» Securing Embedded Systems
Sort
View
ICPR
2010
IEEE
15 years 1 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
FCSC
2010
92views more  FCSC 2010»
15 years 27 days ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
IJIEM
2010
171views more  IJIEM 2010»
15 years 24 days ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
JSS
2010
123views more  JSS 2010»
15 years 23 days ago
Timed Property Sequence Chart
—Probabilistic properties are considered as the most important requirements for a variety of software systems, since they are used to formulate extra-functional requirements such...
Pengcheng Zhang, Bixin Li, Lars Grunske
PERCOM
2010
ACM
15 years 22 days ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
« Prev « First page 2222 / 2321 Last » Next »