Sciweavers

1597 search results - page 250 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
DASFAA
2007
IEEE
187views Database» more  DASFAA 2007»
15 years 10 months ago
OntoDB: An Ontology-Based Database for Data Intensive Applications
Recently, several approaches and systems were proposed to store in the same database data and the ontologies describing their meanings. We call these databases, ontology-based data...
Dehainsala Hondjack, Guy Pierra, Ladjel Bellatrech...
127
Voted
RAID
2010
Springer
15 years 1 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
FPL
2009
Springer
117views Hardware» more  FPL 2009»
15 years 8 months ago
Data parallel FPGA workloads: Software versus hardware
Commercial soft processors are unable to effectively exploit the data parallelism present in many embedded systems workloads, requiring FPGA designers to exploit it (laboriously) ...
Peter Yiannacouras, J. Gregory Steffan, Jonathan R...
174
Voted
DIM
2006
ACM
15 years 9 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
160
Voted
XMLSEC
2003
ACM
15 years 8 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci