Sciweavers

29 search results - page 5 / 6
» Towards Energy-Efficient Intrusion Detection in Pervasive Co...
Sort
View
SAC
2009
ACM
14 years 13 days ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
DSN
2008
IEEE
14 years 3 days ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
AUIC
2002
IEEE
13 years 10 months ago
Tangible User Interaction Using Augmented Reality
This paper describes a novel use of augmented reality for the visualisation of virtual objects as part of the move towards pervasive computing. It uses fiducial markers as switche...
Bruce H. Thomas, Hannah Slay, Rudi Vernik
AIMS
2008
Springer
13 years 12 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
ATC
2009
Springer
13 years 9 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...