Sciweavers

702 search results - page 132 / 141
» Automatic network generation for system-on-chip communicatio...
Sort
View
GLOBECOM
2010
IEEE
13 years 6 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
COMCOM
2006
78views more  COMCOM 2006»
13 years 8 months ago
Personalization of internet telephony services for presence with SIP and extended CPL
This paper discusses issues of personalization of presence services in the context of Internet Telephony. Such services take into consideration the willingness and ability of a use...
Dongmei Jiang, Ramiro Liscano, Luigi Logrippo
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 5 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
UM
2001
Springer
14 years 11 days ago
Recognizing Time Pressure and Cognitive Load on the Basis of Speech: An Experimental Study
In an experimental environment, we simulated the situation of a user who gives speech input to a system while walking through an airport. The time pressure on the subjects and the ...
Christian A. Müller, Barbara Großmann-H...
CCS
2005
ACM
14 years 1 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin