Sciweavers

2503 search results - page 275 / 501
» Building Computer Network Attacks
Sort
View
AUSAI
2006
Springer
15 years 5 months ago
Robust Character Recognition Using a Hierarchical Bayesian Network
There is increasing evidence to suggest that the neocortex of the mammalian brain does not consist of a collection of specialised and dedicated cortical architectures, but instead ...
John Thornton, Torbjorn Gustafsson, Michael Blumen...
CHI
1996
ACM
15 years 6 months ago
Structuring Information with Mental Models: A Tour of Boston
We present a new systematic method of structuring information using mental models. This method can be used both to evaluate the efficiency of an information structure and to build...
Ishantha Lokuge, Stephen A. Gilbert, Whitman Richa...
116
Voted
WINET
2002
166views more  WINET 2002»
15 years 1 months ago
The Anatomy of a Context-Aware Application
We describe a platform for context-aware computing which enables applications to follow mobile users as they move around a building. The platform is particularly suitable for rich...
Andy Harter, Andy Hopper, Pete Steggles, Andy Ward...
JCS
2011
126views more  JCS 2011»
14 years 9 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
SSD
2005
Springer
145views Database» more  SSD 2005»
15 years 7 months ago
High Performance Multimodal Networks
Networks often form the core of many users’ spatial databases. Networks are used to support the rapid navigation and analysis of linearly connected data such as that found in tra...
Erik G. Hoel, Wee-Liang Heng, Dale Honeycutt