Sciweavers

468 search results - page 40 / 94
» Security Weaknesses in Bluetooth
Sort
View
71
Voted
OOPSLA
1992
Springer
15 years 4 months ago
Concurrency Annotations
JAC is a Java extension for high-level concurrent programming, meant to hide the notions of threads and synchronization statements from the programmer. Putting into practice the c...
Klaus-Peter Löhr
94
Voted
RAID
2010
Springer
14 years 10 months ago
Abusing Social Networks for Automated User Profiling
Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security prec...
Marco Balduzzi, Christian Platzer, Thorsten Holz, ...
MOC
2010
14 years 7 months ago
Approximation of nonlinear wave equations with nonstandard anisotropic growth conditions
Weak solutions for nonlinear wave equations involving the p(x)-Laplacian, for p : (1, ) are constructed as appropriate limits of solutions of an implicit finite element discretiz...
Jonas Haehnle, Andreas Prohl
99
Voted
ICCV
2011
IEEE
14 years 17 days ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
115
Voted
ESORICS
2011
Springer
14 years 8 days ago
A New RFID Privacy Model
This paper critically examines some recently proposed RFID privacy models. It shows that some models suffer from weaknesses such as insufficient generality and unrealistic assumpt...
Jens Hermans, Andreas Pashalidis, Frederik Vercaut...