Sciweavers

2719 search results - page 77 / 544
» Exposing Application Alternatives
Sort
View
ICONS
2009
IEEE
16 years 3 days ago
Ontology-Based Decision Support for Information Security Risk Management
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
IWANN
2009
Springer
16 years 5 hour ago
Agents Jumping in the Air: Dream or Reality?
Mobile agent technology has traditionally been recognized as a very useful approach to build applications for mobile computing and wireless environments. However, only a few studie...
Oscar Urra, Sergio Ilarri, Eduardo Mena
131
Voted
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
15 years 12 months ago
Injury evaluation of human-robot impacts
— Currently, large efforts are unertaken to bring robotic applications to domestic environments. Especially physical human-robot cooperation is a major concern and various design...
Sami Haddadin, Alin Albu-Schäffer, Michael St...
IEEEARES
2008
IEEE
15 years 12 months ago
How to Open a File and Not Get Hacked
Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
James A. Kupsch, Barton P. Miller
ICCCN
2007
IEEE
15 years 11 months ago
Design of a Network Service Architecture
— Considerable research efforts in the networking community are focused on defining a new Internet architecture that not only solves some of the problems of the current design, ...
Sivakumar Ganapathy, Tilman Wolf