517,153 Hits in 10.6 sec

Face Recognition Issues in a Border Control Environment [chapter]

Marijana Kosmerlj, Tom Fladsrud, Erik Hjelmås, Einar Snekkenes
2005 Lecture Notes in Computer Science  
To survey the additional value of a human supervisor, we conducted an experiment where we investigated whether a human guard would detect false acceptances made by a computerized system, and the role of  ...  We conducted an experiment in order to estimate percentage of Norwegian people having one or more look-alikes in Norwegian population.  ...  Acknowledgments The face images used in this work have been provided, among others, by the Computer Vision Laboratory, University of Ljubljana, Slovenia [5], Computer Vision Center (CVC) at the U.A.B.  ... 
doi:10.1007/11608288_5 fatcat:jtfjqhsfafhfxb3gk6xmcaojyy

CareNet: An Integrated Wireless Sensor Networking Environment for Remote Healthcare

Shanshan Jiang, Yanchuan Cao, Sameer Iyengar, Philip Kuryloski, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen Wicker
2008 Proceedings of the 3rd International ICST Conference on Body Area Networks  
CareNet is an integrated wireless sensor environment for remote healthcare that uses a two-tier wireless network and an extensible software platform.  ...  CareNet provides both highly reliable and privacy-aware patient data collection, transmission and access.  ...  The application of wireless sensor networks in a medical care environment provides a unique opportunity to shift health care outside a traditional clinical setting to a patient/home-centered setting, and  ... 
doi:10.4108/icst.bodynets2008.2965 dblp:conf/bodynets/JiangCIKJXBW08 fatcat:ybfsvjsl65de7cvm43kjvtwxcy

Security Strategies for Safe Dataand Content Access in OperationalModules of Product DataManagement Software

Sam George, K. David
2018 Journal of Cyber Security and Mobility  
Challenges in security design initiates from the entry of users to the system. Security aspects for user access hold the key in safeguarding the content and data inside.  ...  However, management of this requires a holistic approach in letting the user traverse only through pre-defined modules, data categories with well-defined access mechanisms.  ...  The operational module holds challenges in setting up a secure system with utmost care in operational feasibility amidst stringent security constraints.  ... 
doi:10.13052/jcsm2245-1439.717 fatcat:3rngf4i7u5bitbxeqxl6snj2ue

Implementing a Secure Data Enclave with Columbia University Central Resources

Rajendra Bose
2020 Zenodo  
This group engaged university administrators and has proposed the goal of expanding a successful pilot into a research service at the university level.  ...  The SDE is a scalable alternative to existing "cold room" solutions, and provides access to sensitive or restricted data over the campus network (or over Columbia's virtual private network) with widely  ...  experiences!and!technical!approaches.! A!related!IASSIST!2013!session!was!the!Session!A!Panel:!Managing!Access!to!Restricted!Data! in!Universities,!chaired!by!Katherine!McNeill,!MIT!Libraries.! As!  ... 
doi:10.5281/zenodo.3781099 fatcat:bdamhvbnx5erdku2alnatnedva

Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems

Alefiya Hussain, Ted Faber, Robert Braden, Terry Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz, Laura Tinnel
2014 2014 IEEE International Conference on Distributed Computing in Sensor Systems  
toward providing tools and expertise to enable collaborative research to improve security and resiliency of cyber physical systems.  ...  We demonstrate the feasibility of some of the proposed components through a wide-area situational awareness experiment for the power grid across the three sites.  ...  The consortium is sponsored by the DHS Science and Technology Directorate, Cyber Security Division and The Office of Electricity Delivery and Energy Reliability, DOE.  ... 
doi:10.1109/dcoss.2014.36 dblp:conf/dcoss/HussainFBBYJNSECMT14 fatcat:pb5n6eoqabfsfhi6ylgoufib3q

A Taxonomy and Overview of Information Security Experiments [chapter]

E. Jonsson, L. J. Janczewski
1997 Information Security in Research and Business  
In July 1995 the Erasmus Bureau published a review of university programmes on Information Security followed by a proposal for an Information Security curriculum.  ...  These publications represent the first systematic attempt to review the Information Security discipline and to develop a common university program in the arena.  ...  This set of publications is very important as it is the first systematic attempt to review the discipline and develop a universally accepted university program in the Information Security arena.  ... 
doi:10.1007/978-0-387-35259-6_12 fatcat:kezyqj4diff7flzlfoxkszryfu

University of Manitoba GISHub

Meg Miller, Mullai Manickavalli
2021 Bulletin - Association of Canadian Map Libraries and Archives (ACMLA)  
Secure local environment for active-use geospatial datasets using ArcGIS EnterpriseThe following discusses the software specifics, use cases, and lessons learned in a Canadian academic library context.  ...  This review provides an outline of the solution the University of Manitoba Libraries has implemented to integrate their ESRI Educational Site License.  ...  Secure Local Data Environment The locally hosted Enterprise portion of the Hub allows researchers to honor their data management plans and keep data on university servers while making use of ESRI analysis  ... 
doi:10.15353/acmla.n168.4253 fatcat:v2trgu7yhjdejkpf5rap3lsfzu

Construction of Network Security Course Experimental Platform Based on Virtual Machine and Network Simulator

Yan-Jun FU, Jing WU
2019 DEStech Transactions on Economics Business and Management  
In view of the difficulties in the construction of experimental software and hardware environment in the current network security teaching in most private colleges and universities, this paper puts forward  ...  The experiment content is designed according to the project education mode, taking the network security post ability training as the goal, and the project as the traction.  ...  experiment platform becomes a stumbling block in the network security course construction in many colleges and universities.  ... 
doi:10.12783/dtem/icaem2019/30952 fatcat:envmocpka5gjliiftisunew3l4

Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities

Man Liu, Lei Yu
2022 Intelligent Information Management  
Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides  ...  a design and implementation case of Oracle database security protection system and disaster recovery architecture.  ...  Acknowledgements The authors thank the information network center of China University of Geosciences (Beijing) for providing a good working environment and all colleagues who provide help.  ... 
doi:10.4236/iim.2022.142005 fatcat:wxlag5krxrb5pk5ha3doylk2ze

ECSES – examining crystal structures using `e-science': a demonstrator employing web and grid services to enhance user participation in crystallographic experiments

Simon J. Coles, Jeremy G. Frey, Michael B. Hursthouse, Mark E. Light, Ken E. Meacham, Darren J. Marvin, Mike Surridge
2005 Journal of Applied Crystallography  
The architecture of the system is based on web and grid services (in particular the use ofGlobus, v1.1.4), which provide a secure environment for two-way information flow and communication between the  ...  A seamless distributed computing approach is used to provide remote secure visualization, monitoring and interaction with the laboratory and the diffraction experiment, supervision and input to the data  ...  Valuable assistance with the staging of ConQuest search results to the e-science proxy was provided by the Cambridge Crystallographic Data Centre.  ... 
doi:10.1107/s0021889805025197 fatcat:axcjjghhzzc3jm5ykgw3sju6iy

The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments

Ram Woo, Alex Park, Timothy Hazen
2006 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop  
In this paper we discuss data collection and preliminary experiments for a new speaker verification corpus collected on a small handheld device in multiple environments using multiple microphones.  ...  To provide a set of preliminary results, we examine text-dependent speaker verification under a variety of cross-conditional environment and microphone training constraints.  ...  The authors wish to thank Michael Deisher for his support of this project and his assistance with the Intel handheld device used in this work. References  ... 
doi:10.1109/odyssey.2006.248083 dblp:conf/odyssey/Woo0H06 fatcat:n4ni6fcsbfa3bkqfdduuur2pfu

Analysis of the architecture of the mental health education system for college students based on the Internet of Things and privacy security

Ruijian Xiao, Xingeng Liu
2021 IEEE Access  
Finally, the data set experiment proves that compared with the existing algorithms, the algorithm and model proposed in this paper can better balance the level of privacy protection and classification  ...  In order to strengthen the research on the mental health education model under the network environment, this paper proposes the architecture of the college student mental health education system based  ...  In this experiment, the samples of the data set will be randomly scrambled, taking 2/3 of the samples as the training set, and the remaining samples as the test set.  ... 
doi:10.1109/access.2021.3084208 fatcat:pyi35f4f7rd7phwgydqgul64oe

Design of the FutureGrid experiment management framework

Gregor von Laszewski, Geoffrey C. Fox, Fugang Wang, Andrew J. Younge, Archit Kulshrestha, Gregory G. Pike, Warren Smith, Jens Vockler, Renato J. Figueiredo, Jose Fortes, Kate Keahey
2010 2010 Gateway Computing Environments Workshop (GCE)  
The Experiment management framework will consist of software tools that record user and system actions to generate a reproducible set of tasks and resource configurations.  ...  This makes it possible to compare a variety of experiment setups and analyze the impact Grid and cloud software stacks have.  ...  FutureGrid will support these pre-configured experiment environments with explicit default settings so that researchers can quickly select an appropriate pre-configured environment and use it in their  ... 
doi:10.1109/gce.2010.5676126 fatcat:gvwfhajdjret7lveo4smbhac2q

WINES: Wired and Wireless Intelligent Networked Systems

A. Preece
2005 IEEE Intelligent Systems  
WINES assumes an intelligent, pervasive information and communications technology environment will eventually emerge in which users experience a rich variety of heterogeneous services and systems, delivered  ...  TIME-EACM aims to give application developers a uniform, open platform of event-based middleware that will let them share gathered data in a controlled and secure way.  ... 
doi:10.1109/mis.2005.116 fatcat:2unx6yegpfcr5lss6mma3uct6m

Toward a Science of Secure Environments

Patrick McDaniel, Brian Rivera, Ananthram Swami
2014 IEEE Security and Privacy  
Toward a Science of Secure Environments Patrick McDaniel | Pennsylvania State University Brian Rivera and Ananthram Swami | Army Research Laboratory O ne of the challenges of systems security is its relative  ...  This approach can be generalized in the following way: Given a known initial system state and a known set of system dynamics and behaviors, we can make inferences about all possible future system states  ... 
doi:10.1109/msp.2014.81 fatcat:qop6bxwbhzeh3miboovc6pp5um
« Previous Showing results 1 — 15 out of 517,153 results