Sciweavers

1663 search results - page 38 / 333
» Computer Security in the Real World
Sort
View
CHI
1999
ACM
13 years 12 months ago
Bridging Physical and Virtual Worlds with Electronic Tags
The role of computers in the modern office has tended to split our activities between virtual interactions in the realm of the computer and physical interactions with real objects...
Roy Want, Kenneth P. Fishkin, Anuj Gujar, Beverly ...
AGENTS
2001
Springer
14 years 3 days ago
Implementing soft real-time agent control
Real-time control has become increasingly important as technologies are moved from the lab into real world situations. The complexity associated with these systems increases as co...
Régis Vincent, Bryan Horling, Victor R. Les...
SEMWIKI
2008
134views Data Mining» more  SEMWIKI 2008»
13 years 9 months ago
A Real Semantic Web for Mathematics Deserves a Real Semantics
Abstract. Mathematical documents, and their instrumentation by computers, have rich structure at the layers of presentation, metadata and semantics, as objects in a system for form...
Cezary Kaliszyk, Pierre Corbineau, Freek Wiedijk, ...
FASE
2003
Springer
14 years 24 days ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
WISTP
2010
Springer
14 years 2 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...