Sciweavers

15782 search results - page 3089 / 3157
» Network Optimization and Control
Sort
View
IJCNN
2007
IEEE
15 years 9 months ago
Robotic Architecture Inspired on Behavior Analysis
Learning by human tutelage means that a human being guides the attention of a robot or agent in order to teach it a given concept. This kind of learning is very important to devel...
Claudio A. Policastro, Roseli A. F. Romero, Giovan...
SAINT
2007
IEEE
15 years 9 months ago
Towards a Mobile Peer-to-Peer Service Platform
Peer-to-Peer (P2P) technology is regarded as being disruptive for traditional fixed and mobile operators. However, it can also be considered as an opportunity for new ways of serv...
Wolfgang Kellerer, Zoran Despotovic, Maximilian Mi...
SASO
2007
IEEE
15 years 9 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
CCS
2007
ACM
15 years 9 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
CCS
2007
ACM
15 years 9 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
« Prev « First page 3089 / 3157 Last » Next »