Sciweavers

2429 search results - page 318 / 486
» Using Aspects to Design a Secure System
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
CHI
2006
ACM
16 years 2 months ago
Robot-human interaction with an anthropomorphic percussionist
The paper presents our approach for human-machine interaction with an anthropomorphic mechanical percussionist that can listen to live players, analyze perceptual musical aspects ...
Gil Weinberg, Scott Driscoll
CAISE
2005
Springer
15 years 7 months ago
Dynamic AOP with PROSE
Abstract. Dynamic Aspect-Oriented Programming (d-AOP) is an important tool to implement adaptation in a wide variety of applications. In particular, large distributed infrastructur...
Angela Nicoara, Gustavo Alonso
AAMAS
2007
Springer
15 years 2 months ago
Conversational semantics sustained by commitments
We propose an operational model that combines message meaning and conversational structure in one comprehensive approach. Our long-term research goal is to lay down principles unit...
Roberto A. Flores, Philippe Pasquier, Brahim Chaib...
ACSAC
2010
IEEE
14 years 12 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...