Sciweavers

653 search results - page 119 / 131
» Security Architecture for Federated Cooperative Information ...
Sort
View
WPES
2006
ACM
14 years 1 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
14 years 1 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
MDM
2005
Springer
127views Communications» more  MDM 2005»
14 years 1 months ago
Panel on mobility in sensor networks
Sensor networks are promising unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits ...
Alexandros Labrinidis, Anthony Stefanidis
CISS
2007
IEEE
14 years 2 months ago
Coherent Optical CDMA with low MAI
Abstract. Spectrally phase-coded optical code division multiple access (OCDMA), demodulated with phase and polarization diversity devices, exhibits high spectral efficiency and low...
A. Brinton Cooper, Jacob B. Khurgin, Shuangmei Xu,...
ICWS
2009
IEEE
14 years 4 months ago
SOA-Based Integration of the Internet of Things in Enterprise Services
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply ...
Patrik Spiess, Stamatis Karnouskos, Dominique Guin...