Sciweavers

6861 search results - page 216 / 1373
» Security for Ubiquitous Computing
Sort
View
COLING
2010
14 years 11 months ago
A Discriminative Latent Variable-Based "DE" Classifier for Chinese-English SMT
Syntactic reordering on the source-side is an effective way of handling word order differences. The (DE) construction is a flexible and ubiquitous syntactic structure in Chinese w...
Jinhua Du, Andy Way
155
Voted
JDIM
2010
157views more  JDIM 2010»
14 years 11 months ago
Case studies on context-aware mobile multimedia services
: This paper explores the design, implementation and evaluation of context-aware mobile multimedia services by presenting six case studies on different application domains. The cas...
Timo Ojala
274
Voted

Lecture Notes
404views
17 years 2 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
ESORICS
2009
Springer
16 years 5 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
CCS
2007
ACM
15 years 10 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...