Sciweavers

2081 search results - page 338 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
WS
2005
ACM
14 years 1 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
PET
2005
Springer
14 years 1 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
14 years 1 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
NSPW
2003
ACM
14 years 1 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
AGENTS
2000
Springer
14 years 6 days ago
Exchanging tacit community knowledge by talking-virtualized-egos
This paper describes a method of exchanging tacit community knowledge using talking-virtualized-egos. We aim at sharing tacit knowledge in a community, for this purpose, we propos...
Hidekazu Kubota, Toyoaki Nishida, Tomoko Koda