Sciweavers

679 search results - page 95 / 136
» Using decision problems in public key cryptography
Sort
View
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
15 years 3 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...
FIRA
2010
Springer
156views Robotics» more  FIRA 2010»
14 years 8 months ago
Attracting Students to Engineering: Using Intuitive HRIs for Educational Purposes
Today, industrialized countries are facing a major problem, the lack of skilled engineers. Despite the increasing demand for engineers in the labor market, the number of students g...
Pedro Neto, Nuno Mendes, Nélio Mourato, J. ...
ACSAC
2001
IEEE
15 years 5 months ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes
JUCS
2008
119views more  JUCS 2008»
15 years 1 months ago
A Standards-based Modelling Approach for Dynamic Generation of Adaptive Learning Scenarios
: One of the key problems in developing standard based adaptive courses is the complexity involved in the design phase, especially when establishing the hooks for the dynamic model...
Jesus Boticario, Olga C. Santos
IPPS
2010
IEEE
14 years 11 months ago
Operating system resource management
From the point of view of an operating system, a computer is managed and optimized in terms of the application programming model and the management of system resources. For the TF...
Burton Smith