A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Face Recognition Issues in a Border Control Environment
[chapter]
2005
Lecture Notes in Computer Science
To survey the additional value of a human supervisor, we conducted an experiment where we investigated whether a human guard would detect false acceptances made by a computerized system, and the role of ...
We conducted an experiment in order to estimate percentage of Norwegian people having one or more look-alikes in Norwegian population. ...
Acknowledgments The face images used in this work have been provided, among others, by the Computer Vision Laboratory, University of Ljubljana, Slovenia [5], Computer Vision Center (CVC) at the U.A.B. ...
doi:10.1007/11608288_5
fatcat:jtfjqhsfafhfxb3gk6xmcaojyy
CareNet: An Integrated Wireless Sensor Networking Environment for Remote Healthcare
2008
Proceedings of the 3rd International ICST Conference on Body Area Networks
CareNet is an integrated wireless sensor environment for remote healthcare that uses a two-tier wireless network and an extensible software platform. ...
CareNet provides both highly reliable and privacy-aware patient data collection, transmission and access. ...
The application of wireless sensor networks in a medical care environment provides a unique opportunity to shift health care outside a traditional clinical setting to a patient/home-centered setting, and ...
doi:10.4108/icst.bodynets2008.2965
dblp:conf/bodynets/JiangCIKJXBW08
fatcat:ybfsvjsl65de7cvm43kjvtwxcy
Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software
2018
Journal of Cyber Security and Mobility
Challenges in security design initiates from the entry of users to the system. Security aspects for user access hold the key in safeguarding the content and data inside. ...
However, management of this requires a holistic approach in letting the user traverse only through pre-defined modules, data categories with well-defined access mechanisms. ...
The operational module holds challenges in setting up a secure system with utmost care in operational feasibility amidst stringent security constraints. ...
doi:10.13052/jcsm2245-1439.717
fatcat:3rngf4i7u5bitbxeqxl6snj2ue
Implementing a Secure Data Enclave with Columbia University Central Resources
2020
Zenodo
This group engaged university administrators and has proposed the goal of expanding a successful pilot into a research service at the university level. ...
The SDE is a scalable alternative to existing "cold room" solutions, and provides access to sensitive or restricted data over the campus network (or over Columbia's virtual private network) with widely ...
experiences!and!technical!approaches.! A!related!IASSIST!2013!session!was!the!Session!A!Panel:!Managing!Access!to!Restricted!Data! in!Universities,!chaired!by!Katherine!McNeill,!MIT!Libraries.! As! ...
doi:10.5281/zenodo.3781099
fatcat:bdamhvbnx5erdku2alnatnedva
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems
2014
2014 IEEE International Conference on Distributed Computing in Sensor Systems
toward providing tools and expertise to enable collaborative research to improve security and resiliency of cyber physical systems. ...
We demonstrate the feasibility of some of the proposed components through a wide-area situational awareness experiment for the power grid across the three sites. ...
The consortium is sponsored by the DHS Science and Technology Directorate, Cyber Security Division and The Office of Electricity Delivery and Energy Reliability, DOE. ...
doi:10.1109/dcoss.2014.36
dblp:conf/dcoss/HussainFBBYJNSECMT14
fatcat:pb5n6eoqabfsfhi6ylgoufib3q
A Taxonomy and Overview of Information Security Experiments
[chapter]
1997
Information Security in Research and Business
In July 1995 the Erasmus Bureau published a review of university programmes on Information Security followed by a proposal for an Information Security curriculum. ...
These publications represent the first systematic attempt to review the Information Security discipline and to develop a common university program in the arena. ...
This set of publications is very important as it is the first systematic attempt to review the discipline and develop a universally accepted university program in the Information Security arena. ...
doi:10.1007/978-0-387-35259-6_12
fatcat:kezyqj4diff7flzlfoxkszryfu
University of Manitoba GISHub
2021
Bulletin - Association of Canadian Map Libraries and Archives (ACMLA)
Secure local environment for active-use geospatial datasets using ArcGIS EnterpriseThe following discusses the software specifics, use cases, and lessons learned in a Canadian academic library context. ...
This review provides an outline of the solution the University of Manitoba Libraries has implemented to integrate their ESRI Educational Site License. ...
Secure Local Data Environment The locally hosted Enterprise portion of the Hub allows researchers to honor their data management plans and keep data on university servers while making use of ESRI analysis ...
doi:10.15353/acmla.n168.4253
fatcat:v2trgu7yhjdejkpf5rap3lsfzu
Construction of Network Security Course Experimental Platform Based on Virtual Machine and Network Simulator
2019
DEStech Transactions on Economics Business and Management
In view of the difficulties in the construction of experimental software and hardware environment in the current network security teaching in most private colleges and universities, this paper puts forward ...
The experiment content is designed according to the project education mode, taking the network security post ability training as the goal, and the project as the traction. ...
experiment platform becomes a stumbling block in the network security course construction in many colleges and universities. ...
doi:10.12783/dtem/icaem2019/30952
fatcat:envmocpka5gjliiftisunew3l4
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities
2022
Intelligent Information Management
Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides ...
a design and implementation case of Oracle database security protection system and disaster recovery architecture. ...
Acknowledgements The authors thank the information network center of China University of Geosciences (Beijing) for providing a good working environment and all colleagues who provide help. ...
doi:10.4236/iim.2022.142005
fatcat:wxlag5krxrb5pk5ha3doylk2ze
ECSES – examining crystal structures using `e-science': a demonstrator employing web and grid services to enhance user participation in crystallographic experiments
2005
Journal of Applied Crystallography
The architecture of the system is based on web and grid services (in particular the use ofGlobus, v1.1.4), which provide a secure environment for two-way information flow and communication between the ...
A seamless distributed computing approach is used to provide remote secure visualization, monitoring and interaction with the laboratory and the diffraction experiment, supervision and input to the data ...
Valuable assistance with the staging of ConQuest search results to the e-science proxy was provided by the Cambridge Crystallographic Data Centre. ...
doi:10.1107/s0021889805025197
fatcat:axcjjghhzzc3jm5ykgw3sju6iy
The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments
2006
2006 IEEE Odyssey - The Speaker and Language Recognition Workshop
In this paper we discuss data collection and preliminary experiments for a new speaker verification corpus collected on a small handheld device in multiple environments using multiple microphones. ...
To provide a set of preliminary results, we examine text-dependent speaker verification under a variety of cross-conditional environment and microphone training constraints. ...
The authors wish to thank Michael Deisher for his support of this project and his assistance with the Intel handheld device used in this work.
References ...
doi:10.1109/odyssey.2006.248083
dblp:conf/odyssey/Woo0H06
fatcat:n4ni6fcsbfa3bkqfdduuur2pfu
Analysis of the architecture of the mental health education system for college students based on the Internet of Things and privacy security
2021
IEEE Access
Finally, the data set experiment proves that compared with the existing algorithms, the algorithm and model proposed in this paper can better balance the level of privacy protection and classification ...
In order to strengthen the research on the mental health education model under the network environment, this paper proposes the architecture of the college student mental health education system based ...
In this experiment, the samples of the data set will be randomly scrambled, taking 2/3 of the samples as the training set, and the remaining samples as the test set. ...
doi:10.1109/access.2021.3084208
fatcat:pyi35f4f7rd7phwgydqgul64oe
Design of the FutureGrid experiment management framework
2010
2010 Gateway Computing Environments Workshop (GCE)
The Experiment management framework will consist of software tools that record user and system actions to generate a reproducible set of tasks and resource configurations. ...
This makes it possible to compare a variety of experiment setups and analyze the impact Grid and cloud software stacks have. ...
FutureGrid will support these pre-configured experiment environments with explicit default settings so that researchers can quickly select an appropriate pre-configured environment and use it in their ...
doi:10.1109/gce.2010.5676126
fatcat:gvwfhajdjret7lveo4smbhac2q
WINES: Wired and Wireless Intelligent Networked Systems
2005
IEEE Intelligent Systems
WINES assumes an intelligent, pervasive information and communications technology environment will eventually emerge in which users experience a rich variety of heterogeneous services and systems, delivered ...
TIME-EACM aims to give application developers a uniform, open platform of event-based middleware that will let them share gathered data in a controlled and secure way. ...
doi:10.1109/mis.2005.116
fatcat:2unx6yegpfcr5lss6mma3uct6m
Toward a Science of Secure Environments
2014
IEEE Security and Privacy
Toward a Science of Secure Environments Patrick McDaniel | Pennsylvania State University Brian Rivera and Ananthram Swami | Army Research Laboratory O ne of the challenges of systems security is its relative ...
This approach can be generalized in the following way: Given a known initial system state and a known set of system dynamics and behaviors, we can make inferences about all possible future system states ...
doi:10.1109/msp.2014.81
fatcat:qop6bxwbhzeh3miboovc6pp5um
« Previous
Showing results 1 — 15 out of 517,153 results