Sciweavers

2337 search results - page 378 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
MMDB
2004
ACM
132views Multimedia» more  MMDB 2004»
14 years 2 months ago
The priority curve algorithm for video summarization
In this paper, we introduce the concept of a priority curve associated with a video. We then provide an algorithm that can use the priority curve to create a summary (of a desired...
Marat Fayzullin, V. S. Subrahmanian, Massimiliano ...
IWCMC
2006
ACM
14 years 3 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
WISA
2004
Springer
14 years 2 months ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
WIKIS
2006
ACM
14 years 2 months ago
Towards Wikis as semantic hypermedia
Similarly to the Web Wikis have advanced from initially simple ad-hoc solutions to highly popular systems of widespread use. This evolution is reflected by the impressive number ...
Robert Tolksdorf, Elena Paslaru Bontas Simperl
HT
2005
ACM
14 years 2 months ago
The evolving mSpace platform: leveraging the semantic web on the trail of the memex
Vannevar Bush proposed the memex as a means to support building knowledge in the way he says the human brain works: by association. Achieving this vision has been a core motivatio...
Monica M. C. Schraefel, Daniel A. Smith, Alisdair ...