Sciweavers

2463 search results - page 467 / 493
» Embedded System Engineering Using C C Based Design Methodo...
Sort
View
126
Voted
MOBISYS
2009
ACM
16 years 2 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
91
Voted
MOBISYS
2009
ACM
16 years 2 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
ICAIL
2007
ACM
15 years 6 months ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
CCS
2004
ACM
15 years 7 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
108
Voted
LREC
2010
119views Education» more  LREC 2010»
15 years 3 months ago
Error Correction for Arabic Dictionary Lookup
We describe a new Arabic spelling correction system which is intended for use with electronic dictionary search by learners of Arabic. Unlike other spelling correction systems, th...
C. Anton Rytting, Paul Rodrigues, Tim Buckwalter, ...