Sciweavers

4697 search results - page 858 / 940
» On Directed Information and Gambling
Sort
View
133
Voted
MOBICOM
2006
ACM
15 years 6 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
120
Voted
SACMAT
2006
ACM
15 years 6 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
107
Voted
SIGCSE
2006
ACM
130views Education» more  SIGCSE 2006»
15 years 6 months ago
Scavenger hunt: computer science retention through orientation
This paper describes Scavenger Hunt, a team-based orientation activity for incoming freshmen in the Department of Computer Science at the University of Illinois at Urbana-Champaig...
Jerry O. Talton, Daniel L. Peterson, Sam Kamin, De...
UIST
2006
ACM
15 years 6 months ago
Translating keyword commands into executable code
Modern applications provide interfaces for scripting, but many users do not know how to write script commands. However, many users are familiar with the idea of entering keywords ...
Greg Little, Robert C. Miller
112
Voted
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 6 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie