Sciweavers

11603 search results - page 2224 / 2321
» Securing Embedded Systems
Sort
View
118
Voted
GI
2009
Springer
15 years 3 days ago
Introducing Community Single Sign-On for EDIT
: The European Distributed Institute of Taxonomy (EDIT) platform, as well as biodiversity providers in general, provides a multitude of web-based taxonomic applications and service...
Lutz Suhrbier
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 2 days ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
108
Voted
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 11 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
ISF
2010
164views more  ISF 2010»
14 years 11 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 9 months ago
QoS Routing in Smart Grid
Smart grid is an emerging technology which is able to control the power load via price signaling. The communication between the power supplier and power customers is a key issue in...
Husheng Li, Weiyi Zhang
« Prev « First page 2224 / 2321 Last » Next »