Sciweavers

185 search results - page 28 / 37
» Techniques for Enhanced Physical-Layer Security
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
ICDCSW
2002
IEEE
14 years 26 days ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
WOA
2003
13 years 9 months ago
Agents Ownership Setting by User Fingerprints
— Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s act...
Salvatore Vitabile, Giovanni Pilato, Vincenzo Cont...
SP
2002
IEEE
13 years 7 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
IAT
2006
IEEE
14 years 1 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath