Sciweavers

1804 search results - page 302 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
NOSSDAV
2010
Springer
14 years 1 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker
MHCI
2009
Springer
14 years 1 months ago
Glancephone: an exploration of human expression
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
Richard H. R. Harper, Stuart Taylor
ICASSP
2011
IEEE
13 years 18 days ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
INFSOF
2008
148views more  INFSOF 2008»
13 years 8 months ago
Translating unstructured workflow processes to readable BPEL: Theory and implementation
The Business Process Execution Language for Web Services (BPEL) has emerged as the de-facto standard for implementing processes. Although intended as a language for connecting web ...
Wil M. P. van der Aalst, Kristian Bisgaard Lassen