Sciweavers

6540 search results - page 1203 / 1308
» Data Stream Sharing
Sort
View
KSEM
2010
Springer
15 years 2 months ago
A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Securi
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
PIMRC
2010
IEEE
15 years 2 months ago
The role of channel states in secret key generation
In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delaybased attack, that observing its own channel states is not the only ...
Xiang He, Aylin Yener
147
Voted
SEMWEB
2010
Springer
15 years 2 months ago
Semantic Techniques for Enabling Knowledge Reuse in Conceptual Modelling
Abstract. Conceptual modelling tools allow users to construct formal representations of their conceptualisations. These models are typically developed in isolation, unrelated to ot...
Jorge Gracia del Río, Jochem Liem, Esther L...
SRDS
2010
IEEE
15 years 2 months ago
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection so...
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, J...
142
Voted
TRIDENTCOM
2010
IEEE
15 years 2 months ago
ASSERT: A Wireless Networking Testbed
Abstract. As wireless networks become a critical part of home, business and industrial infrastructure, researchers will meet these demands by providing new networking technologies....
Ehsan Nourbakhsh, Jeff Dix, Paul Johnson, T. Ryan ...
« Prev « First page 1203 / 1308 Last » Next »