Sciweavers

2503 search results - page 381 / 501
» Building Computer Network Attacks
Sort
View
CSCWD
2009
Springer
15 years 8 months ago
ETM Toolkit: A development tool based on Extended Topic Map
By research on Topic Map standard, the Extended Topic Map (ETM) is proposed as a novel model for better organization and management of the massive knowledge resources in E-learnin...
Lu Jiang, Jun Liu, Zhaohui Wu, Qinghua Zheng, Ya-n...
CSE
2008
IEEE
15 years 8 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
IJCNN
2008
IEEE
15 years 8 months ago
Adaptive curiosity for emotions detection in speech
— Exploratory activities seem to be crucial for our cognitive development. According to psychologists, exploration is an intrinsically rewarding behaviour. The developmental robo...
Alexis Bondu, Vincent Lemaire
CLUSTER
2007
IEEE
15 years 8 months ago
Scalable, fault-tolerant management of Grid Services
— The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large numb...
Harshawardhan Gadgil, Geoffrey Fox, Shrideep Palli...
IPPS
2006
IEEE
15 years 7 months ago
Solving generic role assignment exactly
role assignment is a programming abstraction that supports the assignment of user-defined roles to sensor nodes such that certain conditions are met. Many common network configu...
Christian Frank, Kay Römer