Sciweavers

149 search results - page 24 / 30
» An Automation of Mail Channels
Sort
View
EUROCRYPT
2003
Springer
14 years 22 days ago
CAPTCHA: Using Hard AI Problems for Security
We introduce captcha, an automated test that humans can pass, but current computer programs can’t pass: any program that has high success over a captcha can be used to solve an u...
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, Joh...
DAC
1999
ACM
13 years 11 months ago
ipChinook: an Integrated IP-based Design Framework for Distributed Embedded Systems
IPCHINOOK is a design tool for distributed embedded systems. It gains leverage from the use of a carefully chosen set of design ions that raise the level of designer interaction d...
Pai H. Chou, Ross B. Ortega, Ken Hines, Kurt Partr...
RTSS
1994
IEEE
13 years 11 months ago
Guaranteeing End-to-End Timing Constraints by Calibrating Intermediate Processes
This paper presents a comprehensive design methodology for guaranteeing end-to-end requirements of real-time systems. Applications are structured as a set of process components co...
Richard Gerber, Seongsoo Hong, Manas Saksena
ESWS
2004
Springer
13 years 11 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
IJCAI
2003
13 years 8 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván