Sciweavers

211 search results - page 22 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
TWC
2008
156views more  TWC 2008»
13 years 7 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
IEEEARES
2008
IEEE
14 years 1 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
DL
1999
Springer
13 years 11 months ago
Towards a Digital Library of Popular Music
Digital libraries of music have the potential to capture popular imagination in ways that more scholarly libraries cannot. We are working towards a comprehensive digital library o...
David Bainbridge, Craig G. Nevill-Manning, Ian H. ...
IPMI
2005
Springer
14 years 8 months ago
Bayesian Population Modeling of Effective Connectivity
Abstract. A hierarchical model based on the Multivariate Autoregessive (MAR) process is proposed to jointly model neurological time-series collected from multiple subjects, and to ...
Eric R. Cosman Jr., William M. Wells III