Sciweavers

3618 search results - page 130 / 724
» Enabling or disabling technologies
Sort
View
RAID
1999
Springer
14 years 1 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
DIMEA
2008
223views Multimedia» more  DIMEA 2008»
13 years 11 months ago
Toward accessible 3D virtual environments for the blind and visually impaired
3D virtual environments are increasingly used for education, business and recreation but are often inaccessible to users who are visually impaired, effectively creating a digital ...
Gareth R. White, Geraldine Fitzpatrick, Graham McA...
INTERACT
2007
13 years 10 months ago
Meta-design: Expanding Boundaries and Redistributing Control in Design
Meta-design is an emerging conceptual framework aimed at defining and creating socio-technical environments as living entities. It extends existing design methodologies focused on ...
Gerhard Fischer
USS
2004
13 years 10 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
VCIP
2003
118views Communications» more  VCIP 2003»
13 years 10 months ago
Object and event recognition for stroke rehabilitation
Stroke is a major cause of disability and health care expenditure around the world. Existing stroke rehabilitation methods can be effective but are costly and need to be improved....
Ahmed Ghali, Andrew S. Cunningham, Tony P. Pridmor...