Sciweavers

6861 search results - page 196 / 1373
» Security for Ubiquitous Computing
Sort
View
CN
2007
80views more  CN 2007»
15 years 4 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
CCS
2008
ACM
15 years 6 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
CHI
2005
ACM
16 years 4 months ago
A study on the use of semaphoric gestures to support secondary task interactions
We present results of a study that considers (a) gestures outside the context of a specific implementation and (b) their use in supporting secondary, rather than primary tasks in ...
Maria Karam, Monica M. C. Schraefel
CHI
2004
ACM
16 years 4 months ago
The future of signs: interactive information, inexpensively!
We present an inexpensive, interactive ubiquitous computing system that supports information presentation on demand using a novel "card reading" interaction style. We�...
Aradhana Goel, Michael Higgins, Mickey McManus, Ma...
PERCOM
2008
ACM
16 years 4 months ago
Are our homes ready for services? A domotic infrastructure based on the Web service stack
The increase in computational power and the networking abilities of home appliances are revolutionizing the way we interact with our homes. This trend is growing stronger and open...
Marco Aiello, Schahram Dustdar