Sciweavers

1288 search results - page 166 / 258
» Securing aspect composition
Sort
View
SAFECOMP
2005
Springer
14 years 4 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
ICMCS
1999
IEEE
165views Multimedia» more  ICMCS 1999»
14 years 3 months ago
Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robus...
Shelby Pereira, Joseph Ó Ruanaidh, Fr&eacut...
VLDB
1993
ACM
73views Database» more  VLDB 1993»
14 years 2 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
ENTCS
2008
110views more  ENTCS 2008»
13 years 10 months ago
Game-Based Probabilistic Predicate Abstraction in PRISM
ion in PRISM1 Mark Kattenbelt Marta Kwiatkowska Gethin Norman David Parker Oxford University Computing Laboratory, Oxford, UK Modelling and verification of systems such as communi...
Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norm...
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 9 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu