Sciweavers

741 search results - page 138 / 149
» Tools and techniques for Network Forensics
Sort
View
TCSV
2002
101views more  TCSV 2002»
13 years 8 months ago
Error-resilient video transcoding for robust internetwork communications using GPRS
Abstract--A novel fully comprehensive mobile video communications system is proposed in this paper. This system exploits the useful rate management features of the video transcoder...
Safak Dogan, Akin Cellatoglu, Mustafa Uyguroglu, A...
EICS
2011
ACM
13 years 8 days ago
A model-based approach for distributed user interfaces
This paper describes a model-based approach for designing distributed user interfaces (DUIs), i.e. graphical user interfaces that are distributed along one or many of the followin...
Jérémie Melchior, Jean Vanderdonckt,...
MOBISYS
2009
ACM
14 years 9 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
IPSN
2007
Springer
14 years 2 months ago
An empirical study of collaborative acoustic source localization
— Field biologists use animal sounds to discover the presence of individuals and to study their behavior. Collecting bio-acoustic data has traditionally been a difficult and tim...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...
MMMACNS
2005
Springer
14 years 2 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...