Sciweavers

4511 search results - page 585 / 903
» Observation Based System Security
Sort
View
116
Voted
CHI
2010
ACM
15 years 11 months ago
NiCEBook: supporting natural note taking
In this paper, we present NiCEBook, a paper notebook that supports taking, structuring and reusing notes. Through a study of note-taking habits, we observed that different strateg...
Peter Brandl, Christoph Richter, Michael Haller
HASE
2008
IEEE
15 years 11 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest
179
Voted
ICC
2008
IEEE
137views Communications» more  ICC 2008»
15 years 11 months ago
On the Effect of Localization Errors on Geographic Routing in Sensor Networks
—Recently, network localization systems that are based on inter-node ranges have received significant attention. Geographic routing has been considered an application which can u...
Bo Peng, Rainer Mautz, Andrew H. Kemp, Washington ...
128
Voted
CEAS
2007
Springer
15 years 10 months ago
Filtering Image Spam with Near-Duplicate Detection
A new trend in email spam is the emergence of image spam. Although current anti-spam technologies are quite successful in filtering text-based spam emails, the new image spams ar...
Zhe Wang, William K. Josephson, Qin Lv, Moses Char...
LFCS
2007
Springer
15 years 10 months ago
Model Checking Knowledge and Linear Time: PSPACE Cases
We present a general algorithm scheme for model checking logics of knowledge, common knowledge and linear time, based on simulations to a class of structures that capture the way t...
Kai Engelhardt, Peter Gammie, Ron van der Meyden