Sciweavers

452 search results - page 71 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
81
Voted
CORR
2006
Springer
206views Education» more  CORR 2006»
14 years 9 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
MM
2005
ACM
160views Multimedia» more  MM 2005»
15 years 3 months ago
Putting active learning into multimedia applications: dynamic definition and refinement of concept classifiers
The authors developed an extensible system for video exploitation that puts the user in control to better accommodate novel situations and source material. Visually dense displays...
Ming-yu Chen, Michael G. Christel, Alexander G. Ha...
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
A study on user acceptance of error visualization techniques
Location-based services in general require information about the position of certain objects. For instance, for a navigation service the position of the user needs to be known. Th...
Hendrik Lemelson, Thomas King, Wolfgang Effelsberg
SAC
2009
ACM
15 years 2 months ago
SWOBE - embedding the semantic web languages RDF, SPARQL and SPARUL into java for guaranteeing type safety, for checking the sat
The Semantic Web and its technologies become increasingly important. As more and more Semantic Web applications are being used, developing more stable Semantic Web applications be...
Sven Groppe, Jana Neumann, Volker Linnemann
NDSS
2008
IEEE
15 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...