Sciweavers

1345 search results - page 150 / 269
» Reliable dissolve detection
Sort
View
133
Voted
ENTCS
2006
112views more  ENTCS 2006»
15 years 4 months ago
Modeling Web Applications by the Multiple Levels of Integrity Policy
We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects. Modeling exploits the recent "Multiple Le...
Gianluca Amato, Massimo Coppola, Stefania Gnesi, F...
161
Voted
IJMMS
2008
153views more  IJMMS 2008»
15 years 4 months ago
Physiology-based affect recognition for computer-assisted intervention of children with Autism Spectrum Disorder
Generally, an experienced therapist continuously monitors the affective cues of the children with Autism Spectrum Disorders (ASD) and adjusts the course of the intervention accord...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
JSAC
2006
136views more  JSAC 2006»
15 years 4 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
SP
2008
IEEE
15 years 4 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
TWC
2008
109views more  TWC 2008»
15 years 4 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...