Sciweavers

12637 search results - page 2477 / 2528
» Security for Extensible Systems
Sort
View
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 29 days ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 29 days ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...
P2P
2003
IEEE
205views Communications» more  P2P 2003»
14 years 28 days ago
Peer-to-Peer Spatial Queries in Sensor Networks
Sensor networks, that consist of potentially several thousands of nodes each with sensing (heat, sound, light, magnetism, etc.) and wireless communication capabilities, provide gr...
Murat Demirbas, Hakan Ferhatosmanoglu
SRDS
2003
IEEE
14 years 28 days ago
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint
How will a virus propagate in a real network? Does an epidemic threshold exist for a finite powerlaw graph, or any finite graph? How long does it take to disinfect a network giv...
Yang Wang 0008, Deepayan Chakrabarti, Chenxi Wang,...
AOSD
2003
ACM
14 years 28 days ago
Modularisation and composition of aspectual requirements
An effective requirements engineering (RE) approach must harmonise the need to achieve separation of concerns with the need to satisfy broadly scoped requirements and constraints....
Awais Rashid, Ana M. D. Moreira, João Ara&u...
« Prev « First page 2477 / 2528 Last » Next »