Sciweavers

6164 search results - page 1002 / 1233
» Teaching Computer Security
Sort
View
CORR
2000
Springer
138views Education» more  CORR 2000»
15 years 4 months ago
Towards rule-based visual programming of generic visual systems
This paper illustrates how the diagram programming language DIAPLAN can be used to program visual systems. DIAPLAN is a visual rulebased language that is founded on the computation...
Berthold Hoffmann, Mark Minas
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 2 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
CORR
2010
Springer
147views Education» more  CORR 2010»
15 years 2 months ago
Cluster based Key Management in Wireless Sensor Networks
—Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clus...
Anvesh Aileni
SUTC
2010
IEEE
15 years 2 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner
DATESO
2010
150views Database» more  DATESO 2010»
15 years 2 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
« Prev « First page 1002 / 1233 Last » Next »