Sciweavers

398 search results - page 63 / 80
» CamDroid: A System for Implementing Intelligent Camera Contr...
Sort
View
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
AAAI
2011
12 years 8 months ago
Modeling and Monitoring Crop Disease in Developing Countries
Information about the spread of crop disease is vital in developing countries, and as a result the governments of such countries devote scarce resources to gathering such data. Un...
John Alexander Quinn, Kevin Leyton-Brown, Ernest M...
HCI
2007
13 years 10 months ago
An Agent-Based Framework for Context-Aware Services
Abstract. A major challenge of Ambient Intelligence lies in building middleware that can ease service implementation through allowing the application developer to emphasize only th...
Axel Bürkle, Wilmuth Müller, Uwe Pfirrma...
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
14 years 3 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
ICAT
2003
IEEE
14 years 2 months ago
i-ball 2: An Interaction Platform with a Crystal-Ball-Like Display for Multiple Users
The authors’ aim in this work is to develop an easy-to-use computer-human interaction (CHI) platform. In this paper, i-ball 2 (interactive/information ball 2) is introduced as a...
Keita Ushida, Hiroshi Harashima, Jun Ishikawa