Sciweavers

2178 search results - page 238 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ICISS
2007
Springer
15 years 7 months ago
Performance Analysis for Multi Sensor Fingerprint Recognition System
The increasing use of distributed authentication architecture has made interoperability of systems an important issue. Interoperability of systems reflects the maturity of the tech...
Shimon K. Modi, Stephen J. Elliott, Hakil Kim
140
Voted
EDBT
2008
ACM
136views Database» more  EDBT 2008»
15 years 5 months ago
A New Approach to Modular Database Systems
In this paper we present our approach towards a modularized database management system (DBMS) whose components can be adapted at runtime and show the modularization of a DBMS bene...
Florian Irmert, Michael Daum, Klaus Meyer-Wegener
COMCOM
2006
77views more  COMCOM 2006»
15 years 3 months ago
SIP as a unified signalling solution in a beyond 3G system
The adoption of packet-switched technologies in mobile communication systems has enabled the provision of IPbased services to mobile users. Yet, these systems, such as the UMTS net...
Vaggelis Nikas, Georgios V. Lioudakis, Nikolaos L....
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
15 years 10 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos
130
Voted
DAC
2007
ACM
15 years 7 months ago
Synthetic biology: from bacteria to stem cells
Synthetic biology is revolutionizing how we conceptualize and approach the engineering of biological systems. Recent advances in the field are allowing us to expand beyond the con...
Ron Weiss