Sciweavers

2503 search results - page 253 / 501
» Building Computer Network Attacks
Sort
View
PADL
2001
Springer
15 years 6 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
ICPR
2002
IEEE
15 years 7 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
ICDCSW
2002
IEEE
15 years 7 months ago
TWSAPI: A Generic Teamwork Services Application Programming Interface
One of the problems faced by large, global organizations and enterprises is to effectively enable their employees to collaborate across locations. People need collaborative work s...
Engin Kirda, Gerald Reif, Harald Gall, Pascal Fenk...
MOBISYS
2011
ACM
14 years 4 months ago
Indoor location sensing using geo-magnetism
We present an indoor positioning system that measures location using disturbances of the Earth's magnetic field caused by structural steel elements in a building. The presenc...
Jaewoo Chung, Matt Donahoe, Chris Schmandt, Ig-Jae...
CEC
2007
IEEE
15 years 6 months ago
Double-deck elevator systems using Genetic Network Programming with reinforcement learning
Abstract-- In order to increase the transportation capability of elevator group systems in high-rise buildings without adding elevator installation space, double-deck elevator syst...
Jin Zhou, Lu Yu, Shingo Mabu, Kotaro Hirasawa, Jin...