Sciweavers

1597 search results - page 62 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CODES
2003
IEEE
14 years 1 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
TPDS
2008
202views more  TPDS 2008»
13 years 7 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
SPW
2004
Springer
14 years 1 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 5 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Mobility Management for Untethered Immersive Communications
In this paper we propose a system design for delivery of immersive communications to mobile wireless devices based on a distributed proxy model. It is demonstrated that this archi...
Mehran Dowlatshahi, Farzad Safaei