Sciweavers

1010 search results - page 187 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
PERCOM
2003
ACM
14 years 7 months ago
Location Aware Resource Management in Smart Homes
Abstract-- The rapid advances in a wide range of wireless access technologies along with the efficient use of smart spaces have already set the stage for development of smart homes...
Abhishek Roy, Soumya K. Das Bhaumik, Amiya Bhattac...
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
13 years 12 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....
GECCO
2010
Springer
192views Optimization» more  GECCO 2010»
13 years 11 months ago
Resource abundance promotes the evolution of public goods cooperation
Understanding the evolution of cooperation as part of an evolutionary stable strategy (ESS) is a difficult problem that has been the focus of much work. The associated costs of co...
Brian D. Connelly, Benjamin E. Beckmann, Philip K....
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
15 years 2 months ago
Hierarchical Spatio-Temporal Context Modeling for Action Recognition
The problem of recognizing actions in realistic videos is challenging yet absorbing owing to its great potentials in many practical applications. Most previous research is limit...
Jintao Li, Ju Sun, Loong Fah Cheong, Shuicheng Yan...