Sciweavers

137 search results - page 17 / 28
» Moving Toward Effortless Networking
Sort
View
CN
1999
91views more  CN 1999»
14 years 9 months ago
On the Security of Pay-per-Click and Other Web Advertising Schemes
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of wheth...
Vinod Anupam, Alain J. Mayer, Kobbi Nissim, Benny ...
IJCNN
2006
IEEE
15 years 3 months ago
Patterns, Hypergraphs and Embodied General Intelligence
—It is proposed that the creation of Artificial General Intelligence (AGI) at the human level and ultimately beyond is a problem addressable via integrating computer science algo...
Ben Goertzel
DBSEC
2009
163views Database» more  DBSEC 2009»
14 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
67
Voted
WER
2004
Springer
15 years 2 months ago
Evaluating Methodologies: A Requirements Engineering Approach Through the Use of an Exemplar
Systems development methodologies continue to be a central area of research in software engineering. As the nature of applications and systems usage move increasingly towards open ...
Luiz Marcio Cysneiros, Vera Werneck, Eric S. K. Yu
VISAPP
2008
14 years 11 months ago
AN Automated Visual Event Detection System for Cabled Observatory Video
The permanent presence of underwater cameras on cabled observatories, such as the Victoria Experimental Network Under the Sea (VENUS) and Eye-In-The-Sea (EITS) on Monterey Accelera...
Danelle E. Cline, Duane R. Edgington, Jér&o...