Sciweavers

151 search results - page 22 / 31
» his 2009
Sort
View
CSMR
2009
IEEE
15 years 2 months ago
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis
Creating accurate models of information systems is an important but challenging task. It is generally well understood that such modeling encompasses general scientific issues, bu...
Ulrik Franke, Pontus Johnson, Robert Lagerströ...
EPIA
2009
Springer
15 years 2 months ago
Control and Monitoring of a Robotic Soccer Team: The Base Station Application
In robotic soccer, teams of autonomous robots play soccer according to rules similar to the official FIFA rules. The game is refereed by a human and his orders are communicated to ...
Nuno M. Figueiredo, António J. R. Neves, Nu...
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
IVA
2009
Springer
15 years 1 months ago
Breaking the Ice in Human-Agent Communication: Eye-Gaze Based Initiation of Contact with an Embodied Conversational Agent
In human-human conversation, the first impression decides whether two people feel attracted by each other and whether contact between them will be continued or not. Starting from ...
Nikolaus Bee, Elisabeth André and Susanne Tober
GLOBECOM
2009
IEEE
15 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...