Sciweavers

4874 search results - page 916 / 975
» Information theory for data management
Sort
View
REALWSN
2010
14 years 7 months ago
Location Based Wireless Sensor Services in Life Science Automation
Over the last years Wireless Sensor Networks (WSN) have been becoming increasingly applicable for real world scenarios and now production ready solutions are available. In the same...
Benjamin Wagner, Philipp Gorski, Frank Golatowski,...
USS
2010
14 years 7 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
DAC
2009
ACM
14 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 7 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
CSCW
2011
ACM
14 years 4 months ago
Sociable killers: understanding social relationships in an online first-person shooter game
Online video games can be seen as medium for the formation and maintenance of social relationships. In this paper, we explore what social relationships mean under the context of o...
Yan Xu, Xiang Cao, Abigail Sellen, Ralf Herbrich, ...