Sciweavers

823 search results - page 105 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
ISWC
1998
IEEE
14 years 8 days ago
Speaking and Listening on the Run: Design for Wearable Audio Computing
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...
Nitin "Nick" Sawhney, Chris Schmandt
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
COMCOM
2007
100views more  COMCOM 2007»
13 years 8 months ago
Sensor replacement using mobile robots
Sensor replacement is important for sensor networks to provide continuous sensing services. Upon sensor node failures, holes (uncovered areas) may appear in the sensing coverage. ...
Yongguo Mei, Changjiu Xian, Saumitra M. Das, Y. Ch...
FORTE
1996
13 years 9 months ago
Combined Application of SDL-92, OMT, MSC and TTCN
The paper describes the application of SDL-92[1] and OMT[2] to the design of a V5.x Access Network interface. While OMT is used to model the management aspects of the system, typi...
Eurico Inocêncio, Manuel Ricardo, Hitoshi Sa...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 8 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin