Sciweavers

3901 search results - page 705 / 781
» Grid Computing Using Web Services Technologies
Sort
View
ITCC
2005
IEEE
14 years 1 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
CHI
2004
ACM
14 years 8 months ago
Putting the users center stage: role playing and low-fi prototyping enable end users to design mobile systems
This paper sums up lessons learned from a sequence of cooperative design workshops where end users were enabled to design mobile systems through scenario building, role playing, a...
Dag Svanaes, Gry Seland
ICNS
2007
IEEE
14 years 2 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
WSFM
2007
Springer
14 years 1 months ago
Event Structure Semantics of Orc
Developing wide-area distributed applications requires jointly analyzing functional and Quality of Service (QoS) aspects, such as timing properties. Labelled transition systems and...
Sidney Rosario, David Kitchin, Albert Benveniste, ...
HRI
2011
ACM
12 years 11 months ago
Social robotic telepresence
This paper describes a methodology for performing longitudinal evaluations when a social robotic telepresence system is deployed in realistic environments. This work is the core o...
Silvia Coradeschi, Amy Loutfi, Annica Kristofferss...