Sciweavers

2006 search results - page 184 / 402
» Testing with Respect to Concerns
Sort
View
CCS
2005
ACM
15 years 10 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
TLCA
2005
Springer
15 years 10 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
ICIAR
2004
Springer
15 years 10 months ago
Real Time Multiple Object Tracking Based on Active Contours
Abstract. In this paper our purpose is to present some solutions to multiple object tracking in an image sequence with a real time constraint and a possible mobile camera. We propo...
Sébastien Lefèvre, Nicole Vincent
IQ
1996
15 years 5 months ago
Estimating the Quality of Data in Relational Databases
With more and more electronic information sources becoming widely available, the issue of the quality of these, often-competing, sources has become germane. We propose a standard ...
Amihai Motro, Igor Rakov
PERVASIVE
2008
Springer
15 years 4 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...