Sciweavers

738 search results - page 118 / 148
» Comparison of Approaches to Service Deployment
Sort
View
MICAI
2010
Springer
13 years 7 months ago
Teaching a Robot to Perform Tasks with Voice Commands
The full deployment of service robots in daily activities will require the robot to adapt to the needs of non-expert users, particularly, to learn how to perform new tasks from “...
Ana C. Tenorio-Gonzalez, Eduardo F. Morales, Luis ...
MOBICOM
2003
ACM
14 years 1 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 2 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
COMSWARE
2006
IEEE
14 years 2 months ago
Middleware for wireless sensor networks: A survey
Given the fast growing technological progress in microelectronics and wireless communication devices, in the near future, it is foreseeable that Wireless Sensor Networks (WSN) wil...
Salem Hadim, Nader Mohamed
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 1 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...