Skip to main content

Home/ Groups/ CSIA 459
Joseph Walbert

Cyber Modeling (1 of 5) - 1 views

  •  
    Mathematical model on the transmission of worms in wireless sensor network.
Gilbert Rivera

A Journey from floppy disk to cloud storage - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The author of this article discusses the evolution of data storage from floppy disks to the new cloud data storage. This is a quite informative item which shows us the first data storage hardware and backup stores, and how it evolved through time and also its contribution on the world of networking. It also describes cloud data storage, how it works and the future of cloud computing in networking.
Gilbert Rivera

Privacy Preserving Approaches in Cloud: a Survey - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography As the authors note, this paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud. This survey is quite useful because it shows information in several security methodologies involving cloud computing and data storage. It provides with several approaches to the auditing of these systems and ensuring that data stored is secured.
Gilbert Rivera

Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Gilbert Rivera

Data Migration from Grid to Cloud Computing - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this document the authors shows us the migration that business are taking from handling data from their grid to using cloud data storage services. This document focuses on how to use database libraries with data stored in the cloud. It provides guidance in using tools like SQL, Hadoop and HBase mapping. This item can be useful for business to access their databases from information stored in the cloud and can be very helpful.
Gilbert Rivera

Secure, Dependable and High Performance Cloud Storage. - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The authors in the document provide technical details on securing data on the cloud. It shows guides system administrators on the use of Access Control Lists (ACLs), program scripting, and how to implement several methodologies and techniques to maintain a high level of security of data in the cloud. This is a very technical report but is helpful to show insight on how system administrators maintain a secure backbone in the cloud.
sarahterry

Shibboleth Authentication Request - 1 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source explains the history of biometrics and how biometrics have got to where they are now.
sarahterry

Biometric Fingerprinting for Visa Application: Device and Procedure Are Risk Factors fo... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is an example in what companies, government entities as well as products are taking finger prints from people who are applying for credit card, crossing the boarder and how it has stream-lined their process.
sarahterry

Perceptions of biometric experts on whether or not biometric modalities will combat ide... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is from Capella University. It explains how identity fraud can be reduced with the use of fingerprinting.
Rumnea Kelly

Obama meets bin Laden raiders, promises victory over al Qaeda - 0 views

  •  
    Conflicts are become ever increasing and I used this source to show that the U.S. will be relying more on small forces such as the SEAL team in conjunction with unmanned robots.
Rumnea Kelly

Robots, the Military's Newest Forces - 0 views

  •  
    This source describes various applications of robotic usage by the military. It also talks about damages caused by them whether intentional or by mistakes.
Shondre Fort

Gestures are taking control - 0 views

  •  
    The author of this article presents the anticipated growth of gesture control technology. It is already used in Smart phones; however, the author presented information about the expansion of this technology to laptop and personal computers. The author presented how this technology has developed presenting that the beginning formation of this technology has been seen in gaming systems that allow the user to use their body movements to control their avatar. Australian researchers are developing similar technology to be used to control the television.
Shondre Fort

Gesture Control Technology - A giant leap in Human Computer Interaction - 0 views

  •  
    Posted by Gesture-recognition technology's role in redefining usability in consumer electronics has been discussed in great detail already. Music players you can mute by snapping your fingers, TVs that switch off when you walk away from them, the new Google glass that reportedly clicks pictures when you wink are all rapidly taking gesture-control technology mainstream.
Funsho Aiyedogbon

Transmission of patient vital signs using wireless body area networks - 1 views

  •  
    The authors of this article explain that the function of a Wireless Body Area Network (WBAN) is especially valuable during a medical emergency where prioritization becomes necessary.
Funsho Aiyedogbon

Medical applications of wireless sensor networks - current status and future directions - 0 views

  •  
    This article explores the emergence of Wireless Sensor Networks (WSN) and the significant role they play in the area of medical care in this case, telemedicine.
Funsho Aiyedogbon

Detecting vital signs with wearable wireless sensors. - 0 views

  •  
    The authors of this article suggest the advent of technology has necessitated a move away from the traditional approach to health care especially where it concerns the continuous monitoring of patients.
Funsho Aiyedogbon

Technology takes off in long-term care - 0 views

  •  
    This article by Patricia Sheehan explores the way technology is improving the delivery of health care services to senior citizens.
Funsho Aiyedogbon

HealthFace: A web-based remote monitoring interface for medical healthcare systems base... - 0 views

  •  
    This article explores wireless body area sensor network (WBASN). According to the authors, WBASN are used by elderly patients who require continuous monitoring.
Joseph Frank

Virtualizing Your Enterprise Infrastructure: Zones Physical to Virtual (P2V) - 0 views

  •  
    Ease of transition from physical to virtual
Shondre Fort

NEC Develops Technology Enabling Gesture-Based Control of Information - 0 views

  •  
    For immediate use May 15, 2012 Tokyo, May 15, 2012 - NEC Corporation (NEC; TSE: 6701) announced today the development of an interactive technology that allows the control of information through a combination of user gestures and the display of images from a projector.
« First ‹ Previous 141 - 160 Next › Last »
Showing 20 items per page