Sciweavers

2560 search results - page 451 / 512
» Analysis Tool for Honeypot Systems
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ESWS
2007
Springer
14 years 4 months ago
Media, Politics and the Semantic Web
The media play an important role in the functioning of our society. This role is extensively studied by Communication Scientists, requiring a systematic analysis of media content. ...
Wouter van Atteveldt, Stefan Schlobach, Frank van ...
HUMO
2007
Springer
14 years 4 months ago
Robust Spectral 3D-Bodypart Segmentation Along Time
Abstract. In this paper we present a novel tool for body-part segmentation and tracking in the context of multiple camera systems. Our goal is to produce robust motion cues over ti...
Fabio Cuzzolin, Diana Mateus, Edmond Boyer, Radu H...
AICT
2006
IEEE
163views Communications» more  AICT 2006»
14 years 4 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
IEEEPACT
2006
IEEE
14 years 4 months ago
Whole-program optimization of global variable layout
On machines with high-performance processors, the memory system continues to be a performance bottleneck. Compilers insert prefetch operations and reorder data accesses to improve...
Nathaniel McIntosh, Sandya Mannarswamy, Robert Hun...