Sciweavers

1897 search results - page 225 / 380
» eg 2007
Sort
View
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
A Ubiquitous Context-Aware Environment for Surgical Training
— The age of technology has changed the way that surgeons are being trained. Traditional methodologies for training can include lecturing, shadowing, apprenticing, and developing...
Patricia Ordonez, Palanivel Balaji Kodeswaran, Vla...
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
MSS
2007
IEEE
86views Hardware» more  MSS 2007»
14 years 3 months ago
RAIF: Redundant Array of Independent Filesystems
Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems either do not suppo...
Nikolai Joukov, Arun M. Krishnakumar, Chaitanya Pa...
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 3 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
NCA
2007
IEEE
14 years 3 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode