Sciweavers

668 search results - page 57 / 134
» Openness in Higher Education: Open Source, Open Standards, O...
Sort
View
113
Voted
CCS
2011
ACM
14 years 16 days ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
JCM
2007
162views more  JCM 2007»
15 years 13 days ago
Opportunistic Spectrum Access in Fading Channels Through Collaborative Sensing
— Spectrum scarcity is becoming a major issue for service providers interested in either deploying new services or enhancing the capacity for existing applications. On the other ...
Amir Ghasemi, Elvino S. Sousa
TASLP
2010
177views more  TASLP 2010»
14 years 7 months ago
A Watermarking-Based Method for Informed Source Separation of Audio Signals With a Single Sensor
In this paper, the issue of audio source separation from a single channel is addressed, i.e. the estimation of several source signals from a single observation of their mixture. Th...
Mathieu Parvaix, Laurent Girin, Jean-Marc Brossier
CCR
2006
154views more  CCR 2006»
15 years 18 days ago
Medium access control issues in sensor networks
Medium access control for wireless sensor networks has been a very active research area for the past couple of years. The sensor networks literature presents an alphabet soup of m...
Muneeb Ali, Umar Saif, Adam Dunkels, Thiemo Voigt,...
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
15 years 6 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh