Sciweavers

3514 search results - page 558 / 703
» Transportable Information Agents
Sort
View
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 2 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
CHI
2005
ACM
16 years 2 months ago
TRIBA: a cable television retrieval & awareness system
This paper discusses the design of a physical and digital system intended to allow for easy manipulation and interaction with the tremendous amount of options present in advanced ...
Michael Tseng, Jon Kolko
ICWS
2009
IEEE
15 years 11 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison
SAC
2010
ACM
15 years 8 months ago
A deidealisation semantics for KAOS
KAOS is a goal directed requirements engineering framework based on the decomposition and refinement of goals. Decomposition and refinement continue until a point is reached at ...
Richard Banach
CSE
2009
IEEE
15 years 8 months ago
Autonomous Management and Control of Sensor Network-Based Applications
—A central challenge facing sensor network research and development is the difficulty in providing effective autonomous management capability. This is due to a large number of p...
Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoof...