Sciweavers

2178 search results - page 92 / 436
» Toward Systemically Secure IT Architectures
Sort
View
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 3 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
ISMIR
2003
Springer
124views Music» more  ISMIR 2003»
14 years 2 months ago
Toward the scientific evaluation of music information retrieval systems
This paper outlines the findings-to-date of a project to assist in the efforts being made to establish a TREC-like evaluation paradigm within the Music Information Retrieval (MIR)...
J. Stephen Downie
ESCIENCE
2005
IEEE
14 years 2 months ago
GAMA: Grid Account Management Architecture
Security is a critical component of grid systems and while there are numerous software components and tools that provide some capabilities relating to security, there are few comp...
Karan Bhatia, Sandeep Chandra, Kurt Mueller
DAC
2009
ACM
13 years 6 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
MUE
2007
IEEE
116views Multimedia» more  MUE 2007»
14 years 3 months ago
Towards High Quality Mobile Services for Senior Citizens in Smart Living Environments
The aging of our society presents a range of challenges to housing providers. With the advanced mobile technologies we are now able to develop quality mobile services to help seni...
Xiaosong Zheng, Petri Pulli