Sciweavers

1663 search results - page 63 / 333
» Computer Security in the Real World
Sort
View
INFOSECCD
2006
ACM
14 years 2 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
EVOW
2007
Springer
14 years 3 months ago
Unsupervised Evolutionary Segmentation Algorithm Based on Texture Analysis
Abstract. This work describes an evolutionary approach to texture segmentation, a long-standing and important problem in computer vision. The difficulty of the problem can be relat...
Cynthia B. Pérez, Gustavo Olague
TRIDENTCOM
2006
IEEE
14 years 2 months ago
Mapping Link SNRs of wireless mesh networks onto an indoor testbed
— As a platform for synergistic theory-experiment exploration in the field of wireless networking, wireless testbeds have been used to facilitate a broad range of research. From...
Jing Lei, Roy D. Yates, Larry J. Greenstein, Hang ...
SIGIR
2006
ACM
14 years 2 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
CCS
1994
ACM
14 years 29 days ago
Endorsements, Licensing, and Insurance for Distributed System Services
Clients in a distributedsystem place their con dencein many servers, and servers themselves rely on other servers for le storage, authentication, authorization, and payment. When ...
Gennady Medvinsky, Charlie Lai, B. Clifford Neuman