Sciweavers

117 search results - page 4 / 24
» Selective Data Encryption in Outsourced Dynamic Environments
Sort
View
ISM
2006
IEEE
111views Multimedia» more  ISM 2006»
14 years 1 months ago
Compressed-Domain Encryption of Adapted H.264 Video
Commercial service providers and secret services yearn to employ the available environment for conveyance of their data in a secured way. In order to encrypt or to ensure personal...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
WAIM
2009
Springer
14 years 2 months ago
Dynamic Data Migration Policies for Query-Intensive Distributed Data Environments
Abstract. Modern large distributed applications, such as telecommunication and banking services, need to respond instantly to a huge number of queries within a short period of time...
Tengjiao Wang, Bishan Yang, Allen Huang, Qi Zhang,...
MADNES
2005
Springer
14 years 1 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
RSS
2007
192views Robotics» more  RSS 2007»
13 years 9 months ago
Simultaneous Localisation and Mapping in Dynamic Environments (SLAMIDE) with Reversible Data Associa
Abstract— The conventional technique for dealing with dynamic objects in SLAM is to detect them and then either treat them as outliers [20][1] or track them separately using trad...
Charles Bibby, Ian D. Reid
JPDC
2006
103views more  JPDC 2006»
13 years 7 months ago
Fractal: A mobile code-based framework for dynamic application protocol adaptation
The rapid growth of heterogeneous devices and diverse networks in our daily life, makes it is very difficult, if not impossible, to build a one-size-fits-all application or protoc...
Hanping Lufei, Weisong Shi