Sciweavers

2503 search results - page 180 / 501
» Building Computer Network Attacks
Sort
View
110
Voted
CSE
2009
IEEE
15 years 5 months ago
Clustering Signature in Complex Social Networks
An important aspect in social computing is the structure of social networks, which build the underlying substrate for the exchange of information. With the growing importance of mi...
Ueli Peter, Tomas Hruz
105
Voted
PERCOM
2009
ACM
16 years 2 months ago
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods
Abstract--"Secure Device Pairing" is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptib...
Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
150
Voted
PERCOM
2009
ACM
15 years 8 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
141
Voted
SIBGRAPI
2006
IEEE
15 years 7 months ago
Expression Transfer between Photographs through Multilinear AAM's
Expression Transfer is a method for mapping a photographed expression performed by a given subject onto the photograph of another person’s face. Building on well succeeded previ...
Ives Macedo, Emilio Vital Brazil, Luiz Velho
PERCOM
2003
ACM
16 years 1 months ago
Using Semantic Networks for Knowledge Representation in an Intelligent Environment
When building intelligent spaces, the knowledge representation for encapsulating rooms, users, groups, roles, and other information is a fundamental design question. Here we prese...
Stephen Peters, Howard E. Shrobe