Sciweavers

27756 search results - page 5291 / 5552
» Process Query Systems
Sort
View
139
Voted
ACSW
2006
15 years 4 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
120
Voted
CSREASAM
2006
15 years 4 months ago
Framework for realizing Mobile and Computer Communications through Color Signals
: This paper proposes a technology for realizing a mobile network based on color signals which does not require the time and the space switching matrix for call routing. In absence...
Rajarshi Sanyal
100
Voted
ECIS
2004
15 years 4 months ago
The Long Road to being an IS Professional: A Newcomer Perspective
The dot-com boom in the late 1990s attracted vast numbers of undergraduate students into the field of Information Systems (IS) with the promise of being the next "big thing&q...
Kim-Chung Leong, Michael T. K. Tan
149
Voted
EACL
2006
ACL Anthology
15 years 4 months ago
Unifying Synchronous Tree Adjoining Grammars and Tree Transducers via Bimorphisms
We place synchronous tree-adjoining grammars and tree transducers in the single overarching framework of bimorphisms, continuing the unification of synchronous grammars and tree t...
Stuart M. Shieber
CGIM
2003
15 years 4 months ago
Snake for Band Edge Extraction and Its Applications
A novel snake model suitable for edge extraction of bandshape objects is presented in this paper. Based on the proposed model, an edge tracking system, EdgeTrak, has been develope...
Min Li, Chandra Kambhamettu, Maureen C. Stone
« Prev « First page 5291 / 5552 Last » Next »