Sciweavers

327 search results - page 37 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
CN
2004
95views more  CN 2004»
13 years 10 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
XPU
2005
Springer
14 years 3 months ago
An Approach for Assessing Suitability of Agile Solutions: A Case Study
Dynamic market situation and changing customer requirements generate more demands for the product development. Product releases should be developed and managed in short iterations ...
Minna Pikkarainen, Ulla Passoja
IBERAMIA
2004
Springer
14 years 3 months ago
Mobile Robotic Supported Collaborative Learning (MRSCL)
In this paper we describe MRSCL Geometry a collaborative educational activity that explores the use of robotic technology and wirelessly connected Pocket PCs as tools for teaching ...
Rubén Mitnik, Miguel Nussbaum, Alvaro Soto
ACSW
2007
13 years 11 months ago
Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is bei...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
HASE
2008
IEEE
14 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani