Sciweavers

64 search results - page 10 / 13
» Physical Security and Vulnerability Modeling for Infrastruct...
Sort
View
103
Voted
MDM
2009
Springer
115views Communications» more  MDM 2009»
15 years 4 months ago
Supporting Contexts for Indoor Navigation Using a Multilayered Space Model
Indoor navigation highly depends on context and requires flexible data structures to support the many use cases and configurations. For example, an indoor navigation system must c...
Thomas Becker, Claus Nagel, Thomas H. Kolbe
EUSAI
2004
Springer
15 years 1 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
OTM
2005
Springer
15 years 3 months ago
An Ontology- and Resources-Based Approach to Evolution and Reactivity in the Semantic Web
Abstract. The Web of today can be seen as an active and heterogeneous infrastructure of autonomous systems, where reactivity, evolution and propagation of information and changes p...
Wolfgang May, José Júlio Alferes, Ri...
ANSOFT
2002
171views more  ANSOFT 2002»
14 years 9 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
70
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi