Sciweavers

2782 search results - page 462 / 557
» Issues in holistic system design
Sort
View
ESORICS
2007
Springer
15 years 8 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
109
Voted
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
15 years 8 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
HUC
2007
Springer
15 years 8 months ago
A Long-Term Evaluation of Sensing Modalities for Activity Recognition
We study activity recognition using 104 hours of annotated data collected from a person living in an instrumented home. The home contained over 900 sensor inputs, including wired r...
Beth Logan, Jennifer Healey, Matthai Philipose, Em...
ICSOC
2007
Springer
15 years 8 months ago
Service License Composition and Compatibility Analysis
Services enable the transformation of the World Wide Web as distributed interoperable systems interacting beyond organizational boundaries. Service licensing enables broader usage ...
G. R. Gangadharan, Michael Weiss, Vincenzo D'Andre...
111
Voted
COMSWARE
2006
IEEE
15 years 7 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...