Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on (IP) network. Microsoft.
Initially, there were not many threats to network security. With the Internet becoming more popular, more companies are doing business over the web. In addition, a number of attempts to illegally infi...
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly done by the system administrator for security reasons.
Authentication is the first line of defense against compromising confidentiality and integrity . Though traditional login/password based schemes are easy to implement, they have been subjected to seve...
The mind-reading computer system presents information about your mental state as easily as a keyboard and mouse present text and commands. Imagine a future where we are surrounded with mobile phones, cars and online services
The GPRS specifications are written by the European Telecommunications Standard Institute (ETSI), the European counterpart of the American National Standard Institute (ANSI). GPRS stands for Genera...
Data warehousing is the process of constructing and using a data warehouse. A data warehouse is constructed by integrating data from multiple heterogeneous sources that support analytical reporting, structured and/or ad hoc queries, and decision making.
Flash memory stores information in an array of memory cells made from floating-gate transistors. In traditional single-level cell (SLC) devices, each cell stores only one bit of information. Some newe...
As the information age progresses and data becomes more and more valuable, methods need to be discovered to protect and secure sensitive data. An original type of security has appeared, different from...
The basic job of any linker or loader is simple: it binds more abstract names to more concrete names, which permits programmers to write code using the more abstract names. That is, it takes a name wr...
Mobile radio or mobiles refer to wireless communications systems and devices which are based on radio frequencies, and where the path of communications is movable on either end. There are a variety of...
Mobile radio or mobiles refer to wireless communications systems and devices which are based on radio frequencies, and where the path of communications is movable on either end. There are a variety of...
A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the doc...
This paper investigates the discovery of conditional functional dependencies (CFDs). CFDs are a recent extension of functional dependencies (FDs) by supporting patterns of semantically related constan...
Users have access to the portion of the database at their location so that they can access the data relevant to their tasks without interfering with the work of others. A centralized distributed datab...
As digital broadcasting televisions are increasing and the high definition audiovisual content becomes popular rapidly, the data size of the audiovisual content strikingly increases and the transfer...
Honeypot is an exciting new technology with enormous potential for the security community.It is resource which is intended to be attacked and compromised to gain more information about the attacker...
The exponential growth of the Internet and the inexorable increase in native computing power of laptop computers and other digital wireless data communication devices has brought the need for mobile n...
UWB is a wireless technology that transmits binary data—the 0s and 1s that are the digital building blocks of modern information systems. It uses low-energy and extremely short duration (in the orde...
Mobile computing devices have changed the way we look at computing. Laptops and personal digital assistants (PDAs) have unchained us from our desktop computers. A group of researchers at AT&T Laborato...