Sciweavers

3450 search results - page 584 / 690
» Developing Parallel Applications Using the JAVAPORTS Environ...
Sort
View
94
Voted
ACSAC
2005
IEEE
15 years 8 months ago
We Need Assurance!
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers...
Brian D. Snow
126
Voted
ISCAS
2003
IEEE
156views Hardware» more  ISCAS 2003»
15 years 7 months ago
GNOMES: a testbed for low power heterogeneous wireless sensor networks
Continuing trends in sensor, semiconductor and communication systems technology (smaller, faster, cheaper) make feasible very dense networks of fixed and mobile wireless devices ...
Erik Welsh, Walt Fish, J. Patrick Frantz
167
Voted
ISWC
1999
IEEE
15 years 6 months ago
Smart Sight: A Tourist Assistant System
In this paper, we present our e orts towards developing an intelligent tourist system. The system is equipped with a unique combination of sensors and software. The hardware inclu...
Jie Yang, Weiyi Yang, Matthias Denecke, Alex Waibe...
112
Voted
AOSD
2007
ACM
15 years 6 months ago
Highly configurable transaction management for embedded systems
Embedded systems are an important field of research and will gain momentum in the near future. Many of these systems require data management functionality. Due to the resource con...
Mario Pukall, Thomas Leich, Martin Kuhlemann, Mark...
ECRIME
2007
15 years 6 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins