Sciweavers

1663 search results - page 134 / 333
» Computer Security in the Real World
Sort
View
136
Voted
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
15 years 7 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
141
Voted
VRML
2005
ACM
15 years 9 months ago
Location-aware visualization of VRML models in GPS-based mobile guides
In this paper, we present LAMP3D, a system for the locationaware presentation of VRML content on mobile devices. We explore the application of LAMP3D in tourist mobile guides: the...
Stefano Burigat, Luca Chittaro
162
Voted
ICCS
2005
Springer
15 years 9 months ago
Patterns for the Pragmatic Web
The Semantic Web is a significant improvement of the original World Wide Web. It models shared meanings with ontologies, and uses these to provide many different kinds of web servi...
Aldo de Moor
146
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...
144
Voted
GECCO
2004
Springer
114views Optimization» more  GECCO 2004»
15 years 9 months ago
Hybrid Genetic Algorithms for Multi-Objective Optimisation of Water Distribution Networks
Abstract. Genetic algorithms have been a standard technique for engineers optimising water distribution networks for some time. However in recent years there has been an increasing...
Ed Keedwell, Soon-Thiam Khu