Sciweavers

1597 search results - page 170 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 2 months ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook
CMS
2003
108views Communications» more  CMS 2003»
13 years 10 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
IPSN
2004
Springer
14 years 2 months ago
The impact of spatial correlation on routing with compression in wireless sensor networks
The efficacy of data aggregation in sensor networks is a function of the degree of spatial correlation in the sensed phenomenon. While several data aggregation (i.e., routing with...
Sundeep Pattem, Bhaskar Krishnamachari, Ramesh Gov...
IPPS
2008
IEEE
14 years 3 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
ICCAD
1998
IEEE
120views Hardware» more  ICCAD 1998»
14 years 1 months ago
Communication synthesis for distributed embedded systems
Designers of distributed embedded systems face many challenges in determining the appropriate tradeoffs to make when defining a system architecture or retargeting an existing desi...
Ross B. Ortega, Gaetano Borriello