Sciweavers

2101 search results - page 255 / 421
» Engineering Services
Sort
View
AC
2004
Springer
15 years 4 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
130
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Component-based Mobile Web Application of Cross-platform
This article describes the status and analyses the challenges of mobile application development, proposed a frame of component-based hierarchical development. Software is divided ...
Biao Pan, Kun Xiao, Lei Luo
EUROMICRO
2007
IEEE
15 years 10 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
PETRA
2009
ACM
15 years 8 months ago
Ubi-designer: a web-based toolkit for configuring and field-testing UbiComp prototypes
Technology is now available for creating affordable sensor networks and infrastructures for ubiquitous computing environments. In the area of ambient assisted living, contextaware...
Martijn H. Vastenburg, Halldór Fjalldal, Ch...