Sciweavers

1990 search results - page 377 / 398
» services 2010
Sort
View
ESORICS
2010
Springer
14 years 9 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
GECCO
2010
Springer
244views Optimization» more  GECCO 2010»
14 years 9 months ago
Implicit fitness and heterogeneous preferences in the genetic algorithm
This paper takes an economic approach to derive an evolutionary learning model based entirely on the endogenous employment of genetic operators in the service of self-interested a...
Justin T. H. Smith
CAD
2010
Springer
14 years 9 months ago
AR interfacing with prototype 3D applications based on user-centered interactivity
Augmented Reality (AR) has been acclaimed as one of the promising technologies for advancing future UbiComp (Ubiquitous Computing) environments. Despite a myriad of AR application...
Seungjun Kim, Anind K. Dey
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 9 months ago
Dist-Orc: A Rewriting-based Distributed Implementation of Orc with Formal Analysis
Abstract. Orc is a theory of orchestration of services that allows structured programming of distributed and timed computations. Several formal semantics have been proposed for Orc...
Musab AlTurki, José Meseguer
CORR
2010
Springer
121views Education» more  CORR 2010»
14 years 9 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic