Sciweavers

6240 search results - page 1097 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
GLOBECOM
2010
IEEE
14 years 11 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 11 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
ICSOC
2009
Springer
14 years 11 months ago
Integrating Complex Events for Collaborating and Dynamically Changing Business Processes
Business processes must become agile, respond to changes in the business environment in a timely manner and quickly adapt themselves to new conditions. Event-Driven Business Proces...
Rainer von Ammon, Thomas Ertlmaier, Opher Etzion, ...
ET
2010
122views more  ET 2010»
14 years 11 months ago
Fault Models for Quantum Mechanical Switching Networks
This work justifies several quantum gate level fault models and discusses the causal error mechanisms thwarting correct function. A quantum adaptation of the classical test set gen...
Jacob D. Biamonte, Jeff S. Allen, Marek A. Perkows...
IOT
2010
14 years 11 months ago
Evaluation of 1D barcode scanning on mobile phones
Abstract--1D or linear barcodes are the black-and-whitestriped codes that can be found on most consumer products. This work evaluates existing 1D barcode scanners for mobile phones...
Felix von Reischach, Stephan Karpischek, Florian M...
« Prev « First page 1097 / 1248 Last » Next »