Sciweavers

1597 search results - page 34 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ICDM
2008
IEEE
135views Data Mining» more  ICDM 2008»
14 years 2 months ago
A Data Stream Mining System
On-line data stream mining has attracted much research interest, but systems that can be used as a workbench for online mining have not been researched, since they pose many difď¬...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo
LCN
2008
IEEE
14 years 2 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
ACSAC
2001
IEEE
13 years 11 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
PIMRC
2008
IEEE
14 years 2 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...
ITNG
2006
IEEE
14 years 1 months ago
Secure Two-Way Transfer of Measurement Data
We introduce a measurement system architecture, which has three main qualities: secure two-way transfer of measurement data, quick adaptability to different kinds of measurement ...
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesm...