Sciweavers

2463 search results - page 467 / 493
» Embedded System Engineering Using C C Based Design Methodo...
Sort
View
MOBISYS
2009
ACM
14 years 8 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
MOBISYS
2009
ACM
14 years 8 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
ICAIL
2007
ACM
13 years 11 months ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
CCS
2004
ACM
14 years 24 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
LREC
2010
119views Education» more  LREC 2010»
13 years 8 months ago
Error Correction for Arabic Dictionary Lookup
We describe a new Arabic spelling correction system which is intended for use with electronic dictionary search by learners of Arabic. Unlike other spelling correction systems, th...
C. Anton Rytting, Paul Rodrigues, Tim Buckwalter, ...