Sciweavers

6909 search results - page 1376 / 1382
» Distributed display environments
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
GI
2009
Springer
13 years 5 months ago
Spontaneous and Privacy-friendly Mobile Indoor Routing and Navigation
Abstract: Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, offi...
Peter Ruppel, Florian Gschwandtner
ICISS
2009
Springer
13 years 5 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
13 years 5 months ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 5 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
« Prev « First page 1376 / 1382 Last » Next »