-
1
-
-
85017313616
-
Cloud computing - Issues, research and implementations
-
Vouk, M.A.: 'Cloud computing - issues, research and implementations', J. Comput. Inf. Technol., 2008, 16, (4), pp. 235-246
-
(2008)
J. Comput. Inf. Technol.
, vol.16
, Issue.4
, pp. 235-246
-
-
Vouk, M.A.1
-
2
-
-
49149119622
-
Computing in the clouds
-
Weiss, A.: 'Computing in the clouds', Net Worker, 2007, 11, (4), pp. 16-25
-
(2007)
Net Worker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
3
-
-
77954879049
-
Cloud computing: A perspective study
-
Wang, L., Laszewski, G., Kunze, M., Tao, J.: 'Cloud computing: a perspective study', New Gener. Comput., 2010, 28, pp. 137-146
-
(2010)
New Gener. Comput.
, vol.28
, pp. 137-146
-
-
Wang, L.1
Laszewski, G.2
Kunze, M.3
Tao, J.4
-
6
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
13 November
-
Chow, R., Golle, P., Jakobsson, M., et al: 'Controlling data in the cloud: outsourcing computation without outsourcing control'. Proc. 2009 ACM workshop on Cloud Computing Security, 13 November 2009
-
(2009)
Proc. 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
-
7
-
-
0028951888
-
Intensive home-care surveillance prevents hospitalization and improves morbidity rates among elderly patients with severe congestive heart failure
-
Kornowski, R., Zeeli, D., Averbuch, M.: 'Intensive home-care surveillance prevents hospitalization and improves morbidity rates among elderly patients with severe congestive heart failure', Am. Heart J., 1995, 129, pp. 762-766
-
(1995)
Am. Heart J.
, vol.129
, pp. 762-766
-
-
Kornowski, R.1
Zeeli, D.2
Averbuch, M.3
-
8
-
-
84879336509
-
Dynamic probe window based optimization for surveillance in home security system
-
Kapoor, B., Chhabra, A.: 'Dynamic probe window based optimization for surveillance in home security system', Int. J. Comput. Sci. Inf. Technol. (IJCSIT), 2010, 2, (1), pp. 106-114
-
(2010)
Int. J. Comput. Sci. Inf. Technol. (IJCSIT)
, vol.2
, Issue.1
, pp. 106-114
-
-
Kapoor, B.1
Chhabra, A.2
-
9
-
-
34347329030
-
A complexity-aware video adaptation mechanism for live streaming systems
-
Lu, M.T., Yao, J.J., Chen, H.H.: 'A complexity-aware video adaptation mechanism for live streaming systems', EURASIP J. Adv. Signal Process., 2007, 2007, pp. 1-10
-
(2007)
EURASIP J. Adv. Signal Process.
, vol.2007
, pp. 1-10
-
-
Lu, M.T.1
Yao, J.J.2
Chen, H.H.3
-
11
-
-
80053161148
-
Relational cloud: A database-as-A-service for the cloud
-
Curino, C., Jones, E.P.C., Popa, R.A., et al: 'Relational cloud: a database-as-a-service for the cloud'. Proc. Fifth Biennial Conf. Innovative Data Systems Research (CIDR'11|), 2011
-
(2011)
Proc. Fifth Biennial Conf. Innovative Data Systems Research (CIDR'11|)
-
-
Curino, C.1
Jones, E.P.C.2
Popa, R.A.3
-
13
-
-
77954491603
-
A PKI-based mechanism for secure and efficient access to outsourced data
-
June
-
Dai, L., Zhou, Q.: 'A PKI-based mechanism for secure and efficient access to outsourced data'. Proc. Second Int. Conf. Networking and Digital Society (ICNDS), June 2010, (1), pp. 640
-
(2010)
Proc. Second Int. Conf. Networking and Digital Society (ICNDS)
, Issue.1
, pp. 640
-
-
Dai, L.1
Zhou, Q.2
-
14
-
-
79953147116
-
Secure data access in cloud computing
-
Bangalore, December
-
Sanka, S., Hota, C., Rajarajan, M.: 'Secure data access in cloud computing'. IEEE Fourth Int. Conf. Internet Multimedia Systems Architectures and Applications (IMSAA 2010), Bangalore, December 2010
-
(2010)
IEEE Fourth Int. Conf. Internet Multimedia Systems Architectures and Applications (IMSAA 2010)
-
-
Sanka, S.1
Hota, C.2
Rajarajan, M.3
-
17
-
-
80053605352
-
Security in near field communication (NFC) strengths and weaknesses
-
Haselsteiner, E., Breitfuss, K.: 'Security in near field communication (NFC) strengths and weaknesses'. Workshop on RFID Security, 2006
-
(2006)
Workshop on RFID Security
-
-
Haselsteiner, E.1
Breitfuss, K.2
-
18
-
-
34547970838
-
Pervasive RFID and near field communication technology
-
39
-
Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: 'Pervasive RFID and near field communication technology', IEEE Pervasive Comput., 2007, 6, (3), 39, pp. 2-5
-
(2007)
IEEE Pervasive Comput.
, vol.6
, Issue.3
, pp. 2-5
-
-
Michahelles, F.1
Thiesse, F.2
Schmidt, A.3
Williams, J.R.4
-
19
-
-
0033363090
-
A common image processing framework for 2D barcode reading
-
Ottaviani, E., Pava, A., Bottazi, M., Brunclli, E., Casclli, F., Guerreo, M.: 'A common image processing framework for 2D barcode reading'. Proc. Seventh Int. Conf. Image Processing and its Applications, 1999, pp. 652-655
-
(1999)
Proc. Seventh Int. Conf. Image Processing and Its Applications
, pp. 652-655
-
-
Ottaviani, E.1
Pava, A.2
Bottazi, M.3
Brunclli, E.4
Casclli, F.5
Guerreo, M.6
-
20
-
-
37349036802
-
Understanding 2D-BarCode technology and applications in M-commerce - Design and implementation of a 2D barcode processing solution
-
Gao, J.Z., Prakash, L., Jagatesan, R.: 'Understanding 2D-BarCode technology and applications in M-commerce - design and implementation of a 2D barcode processing solution'. Proc. 31st Int. Conf. Annual International Computer Software and Applications, 2007, pp. 49-56
-
(2007)
Proc. 31st Int. Conf. Annual International Computer Software and Applications
, pp. 49-56
-
-
Gao, J.Z.1
Prakash, L.2
Jagatesan, R.3
-
21
-
-
33947112835
-
2D barcodes for mobile phones
-
Kato, H., Tan, K.T.: '2D barcodes for mobile phones'. Proc. Second Int. Conf. Mobile Technology, Applications and Systems, 2005, p 8
-
(2005)
Proc. Second Int. Conf. Mobile Technology, Applications and Systems
, pp. 8
-
-
Kato, H.1
Tan, K.T.2
-
22
-
-
19644391747
-
Development of the traceability system which secures the safety of fishery products using the QR code and a digital signature
-
Kobe
-
Seino, K., Kuwabara, S., Mikami, S., et al: 'Development of the traceability system which secures the safety of fishery products using the QR code and a digital signature'. Proc. MTS/IEEE TECHNO-OCEAN, Kobe, 2004, vol. 1, pp. 476-481
-
(2004)
Proc. MTS/IEEE TECHNO-OCEAN
, vol.1
, pp. 476-481
-
-
Seino, K.1
Kuwabara, S.2
Mikami, S.3
-
24
-
-
67649528984
-
Introducing QR code in classroom management and communication via mobile phone application system
-
Chaisatien, P., Akahori, K.: 'Introducing QR code in classroom management and communication via mobile phone application system'. Proc. World Conf. Educational Multimedia, Hypermedia and Telecommunications, 2006, pp. 2181-2187
-
(2006)
Proc. World Conf. Educational Multimedia, Hypermedia and Telecommunications
, pp. 2181-2187
-
-
Chaisatien, P.1
Akahori, K.2
-
26
-
-
84878369941
-
Review and revocation of access privileges distributed with PKI certificates
-
Khurana, H., Gligor, V.D.: 'Review and revocation of access privileges distributed with PKI certificates'. Proc. Security Protocols Workshop, 2002, pp. 100-112
-
(2002)
Proc. Security Protocols Workshop
, pp. 100-112
-
-
Khurana, H.1
Gligor, V.D.2
-
30
-
-
77955186544
-
Trust Visor: Efficient TCB reduction and attestation
-
Oakland
-
McCune, J.M., Li, Y., Qu, N., et al: 'Trust Visor: efficient TCB reduction and attestation'. Proc. IEEE Symp. Security and Privacy, Oakland, 2010
-
(2010)
Proc. IEEE Symp. Security and Privacy
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
-
31
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: 'Attribute-based encryption for fine-grained access control of encrypted data'. Proc. CCS'06, 2006
-
(2006)
Proc. CCS'06
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
|