Sciweavers

127 search results - page 25 / 26
» Analysis of User's Relation and Reading Activity in Weblogs
Sort
View
SIMUTOOLS
2008
13 years 7 months ago
Snoopy: a tool to design and animate/simulate graph-based formalisms
We sketch the fundamental properties and features of Snoopy, a tool to model and execute (animate, simulate) hierarchical graph-based system descriptions. The tool comes along wit...
Monika Heiner, Ronny Richter, Martin Schwarick
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
14 years 11 days ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped ï¬rst. Usually, the channel is desired to be authenticated and conï...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
ISI
2006
Springer
13 years 5 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 5 days ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
NRHM
2000
149views more  NRHM 2000»
13 years 5 months ago
Navigable history: a reader's view of writer's time
Collecting, analyzing, and sharing information via a hypertext results in the continuous modification of information content over a long period of time. Such tasks will benefit fr...
Frank M. Shipman III, Hao-wei Hsieh