Sciweavers

897 search results - page 139 / 180
» Security Requirements for RFID Computing Systems
Sort
View
GECON
2007
Springer
124views Business» more  GECON 2007»
14 years 2 months ago
On Business Grid Demands and Approaches
This paper addresses necessary modification and extensions of existing Grid Computing approaches in order to meet nowadays business demand. So far, Grid Computing has been used to...
Carsten Franke, Adolf Hohl, Philip Robinson, Bernd...
NOSSDAV
2009
Springer
14 years 2 months ago
Robust live media streaming in swarms
Data dissemination in decentralized networks is often realized by using some form of swarming technique. Swarming enables nodes to gather dynamically in order to fulfill a certai...
Thomas Locher, Remo Meier, Roger Wattenhofer, Stef...
ACCV
2007
Springer
14 years 2 months ago
Task Scheduling in Large Camera Networks
Camera networks are increasingly being deployed for security. In most of these camera networks, video sequences are captured, transmitted and archived continuously from all cameras...
Ser-Nam Lim, Larry S. Davis, Anurag Mittal
SAC
2010
ACM
14 years 2 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ATAL
2004
Springer
14 years 1 months ago
RDS: Remote Distributed Scheme for Protecting Mobile Agents
As of today no solely software-based solution that a priori protects the computation of any mobile code and/or mobile agent was presented. Furthermore, Algesheimer et al. [1], arg...
Asnat Dadon-Elichai