Sciweavers

2503 search results - page 357 / 501
» Building Computer Network Attacks
Sort
View
108
Voted
ACSAC
2010
IEEE
14 years 11 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
103
Voted
CHI
2010
ACM
15 years 8 months ago
SensorTune: a mobile auditory interface for DIY wireless sensor networks
Wireless Sensor Networks (WSNs) allow the monitoring of activity or environmental conditions over a large area, from homes to industrial plants, from agriculture fields to forest...
Enrico Costanza, Jacques Panchard, Guillaume Zuffe...
SPAA
2005
ACM
15 years 7 months ago
Fast construction of overlay networks
An asynchronous algorithm is described for rapidly constructing an overlay network in a peer-to-peer system where all nodes can in principle communicate with each other directly t...
Dana Angluin, James Aspnes, Jiang Chen, Yinghua Wu...
113
Voted
CVPR
2003
IEEE
16 years 3 months ago
Learning Bayesian Network Classifiers for Facial Expression Recognition using both Labeled and Unlabeled Data
Understanding human emotions is one of the necessary skills for the computer to interact intelligently with human users. The most expressive way humans display emotions is through...
Ira Cohen, Nicu Sebe, Fabio Gagliardi Cozman, Marc...
CF
2004
ACM
15 years 7 months ago
An architectural framework and a middleware for cooperating smart components
In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously act in response to it. Examples ran...
Antonio Casimiro, Jörg Kaiser, Paulo Ver&iacu...