Sciweavers

1265 search results - page 142 / 253
» Computer poker: A review
Sort
View
90
Voted
PERCOM
2005
ACM
15 years 9 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
ICWS
2009
IEEE
15 years 7 months ago
Intelligent Matching for Public Internet Web Services Towards Semi-Automatic Internet Services Mashup
In this paper, we propose an Internet public Web service matching approach that paves the way for (semi-)automatic service mashup. We will first provide the overview of the soluti...
Chen Wu, Tharam S. Dillon, Elizabeth Chang
123
Voted
ICMLA
2009
15 years 7 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 7 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
HICSS
2010
IEEE
130views Biometrics» more  HICSS 2010»
15 years 5 months ago
On the Reliability of Software Piracy Statistics
Despite tremendous debate and policy interest in software piracy, the accuracy of piracy statistics compiled by the Business Software Alliance (BSA) has been accepted at face valu...
Ivan P. L. Png