Sciweavers

20833 search results - page 3842 / 4167
» Hidden process models
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
15 years 4 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
JSS
2006
153views more  JSS 2006»
15 years 4 months ago
Towards the automatic generation of mobile agents for distributed intrusion detection system
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to b...
Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Gu...
JTAER
2006
109views more  JTAER 2006»
15 years 4 months ago
Shopping Online or Not? Cognition and Personality Matters
E-commerce has brought both opportunities and challenges to Internet marketers. One challenge facing the marketers is to "convert" Internet users who are reluctant to bu...
Sophia Wang, Simon Wang, Ming T. Wang
JUCS
2006
146views more  JUCS 2006»
15 years 4 months ago
Health Monitoring and Assistance to Support Aging in Place
: To many people, home is a sanctuary. For those people who need special medical care, they may need to be pulled out of their home to meet their medical needs. As the population a...
Diane J. Cook
JUCS
2006
86views more  JUCS 2006»
15 years 4 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
« Prev « First page 3842 / 4167 Last » Next »