Sciweavers

349 search results - page 40 / 70
» Transactional Computation: Overview and Discussion
Sort
View
RAID
2004
Springer
15 years 3 months ago
Symantec Deception Server Experience with a Commercial Deception System
This paper provides an examination of an emerging class of security mechanisms often referred to as deception technologies or honeypots. It is based on our experience over the last...
Brian Hernacki, Jeremy Bennett, Thomas Lofgren
ACSAC
2000
IEEE
15 years 2 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
CSFW
1996
IEEE
15 years 1 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer
EUPROJECTS
2006
Springer
15 years 1 months ago
User Interfaces for Persons with Deafblindness
This paper examines problems persons with deafblindness have when using computers and it analyses how we can approach these problems in the redesign of a communication tool. A qual...
Sara Rutgersson, Mattias Arvola
APBC
2003
191views Bioinformatics» more  APBC 2003»
14 years 11 months ago
Oracle's Technology for Bioinformatics and Future Directions
The Oracle relational database management system, with object-oriented extensions and numerous applicationdriven enhancements, plays a critical role worldwide in managing the expl...
Bruce Blackwell, Siva Ravada