Sciweavers

4985 search results - page 946 / 997
» Observation of String-Rewriting Systems
Sort
View
81
Voted
BIOWIRE
2007
Springer
15 years 4 months ago
User-Centric Mobility Models for Opportunistic Networking
Abstract. In this chapter we survey the most recent proposals for modelling user mobility in mobile pervasive networks, and specifically in opportunistic networks. We identify two...
Chiara Boldrini, Marco Conti, Andrea Passarella
CCS
2007
ACM
15 years 4 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ECTEL
2007
Springer
15 years 4 months ago
Reflections on Digital Literacy
Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy, digital literacy or digital competenc...
Harald Gapski
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 4 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
GFKL
2007
Springer
152views Data Mining» more  GFKL 2007»
15 years 4 months ago
Supporting Web-based Address Extraction with Unsupervised Tagging
Abstract. The manual acquisition and modeling of tourist information as e.g. addresses of points of interest is time and, therefore, cost intensive. Furthermore, the encoded inform...
Berenike Loos, Chris Biemann