Sciweavers

2429 search results - page 318 / 486
» Using Aspects to Design a Secure System
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
CHI
2006
ACM
15 years 10 months ago
Robot-human interaction with an anthropomorphic percussionist
The paper presents our approach for human-machine interaction with an anthropomorphic mechanical percussionist that can listen to live players, analyze perceptual musical aspects ...
Gil Weinberg, Scott Driscoll
81
Voted
CAISE
2005
Springer
15 years 3 months ago
Dynamic AOP with PROSE
Abstract. Dynamic Aspect-Oriented Programming (d-AOP) is an important tool to implement adaptation in a wide variety of applications. In particular, large distributed infrastructur...
Angela Nicoara, Gustavo Alonso
AAMAS
2007
Springer
14 years 10 months ago
Conversational semantics sustained by commitments
We propose an operational model that combines message meaning and conversational structure in one comprehensive approach. Our long-term research goal is to lay down principles unit...
Roberto A. Flores, Philippe Pasquier, Brahim Chaib...
ACSAC
2010
IEEE
14 years 8 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...