The Alred construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secur...
详细信息
The growth of digital content generation and its access by the general public have, for the past few years, promoted the importance of resources' metadata, and enhanced the debate on their generation and quality. ...
详细信息
This paper introduces new network architecture capable of providing a flexible and configurable Recommendation System in which network operator, subscribers and content providers could interact to each other by messag...
详细信息
IT Governance has become an increasingly important process in delivering business value from IT, A number of IT governance frameworks have been proposed as the MIT - CISR framework and COBIT. However, there is no prop...
详细信息
Security in Wireless Sensor networks (WSNs) is highly dependent on the behavior of the base station. This happens because, if the network is left unattended, sensor nodes cannot offload data to the (secure) base stati...
详细信息
- A process for accurate text recognition of generic identification documents (ID) over cloud computing is presented. It consists of two steps, first, a smartphone camera takes a picture of the ID, which is sent to a ...
详细信息
Current Internet traffic comprises diverse service requirements. Service providers differentiate connections characteristics according to demand's requirements and pricing policy. In this paper we propose a differ...
详细信息
Current Internet traffic comprises diverse service requirements. Service providers differentiate connections characteristics according to demand's requirements and pricing policy. In this paper we propose a differentiated service methodology that implements constrained resources allocation according to demand's priority level for WDM networks. With our proposed mechanism higher priority connections are guaranteed a larger amount of resources, still, lower priority demands are guaranteed a minimum level of service.
This paper describes a music searching system based on an automatic indexing process created over a pattern recognition tool and MPEG-7 standard. We present a complete analysis of the involved technologies integration...
详细信息
This paper describes a music searching system based on an automatic indexing process created over a pattern recognition tool and MPEG-7 standard. We present a complete analysis of the involved technologies integration process and show a reference measure in the feasibility of this kind of application not only in the research environment but also in the production of real systems.
暂无评论