Sciweavers

3006 search results - page 472 / 602
» Overview
Sort
View
116
Voted
COMSIS
2007
80views more  COMSIS 2007»
15 years 1 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
COMSUR
2007
101views more  COMSUR 2007»
15 years 1 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
101
Voted
IVC
2008
106views more  IVC 2008»
15 years 1 months ago
Attention links sensing to recognition
This paper presents arguments that explicit strategies for visual attentional selection are important for cognitive vision systems, and shows that a number of proposals currently ...
Albert L. Rothenstein, John K. Tsotsos
CORR
2007
Springer
94views Education» more  CORR 2007»
15 years 1 months ago
Exploring the academic invisible web
Purpose: To provide a critical review of Bergman’s 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We defi...
Dirk Lewandowski, Philipp Mayr
127
Voted
IJWET
2006
163views more  IJWET 2006»
15 years 1 months ago
A CASE tool for modelling and automatically generating web service-enabled applications
: This paper presents a CASE tool for the high-level specification of web applications integrated with web services. The CASE tool is based on WebML, a conceptual modelling languag...
Marco Brambilla, Stefano Ceri, Sara Comai, Piero F...