Sciweavers

89 search results - page 14 / 18
» Keystroke dynamics for user authentication
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
IJSN
2008
147views more  IJSN 2008»
13 years 7 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
C5
2007
IEEE
14 years 1 months ago
Syncing Croquet with the Real World
3D virtual environments like Croquet need to be attractive in order to be visited and used. Their attractiveness depends on the level of vitality that the user is able to experien...
Grit Schuster, Christine Strothotte, Carola Zwick
ICWL
2004
Springer
14 years 1 months ago
CUBES: Providing Flexible Learning Environment for Virtual Universities
Abstract. To enable an online virtual university, a learning environment covering the entire spectrum of the learning and management process is required. However, constructing such...
Peifeng Xiang, Yuanchun Shi, Weijun Qin, Xin Xiang
CCGRID
2004
IEEE
13 years 11 months ago
Net-dbx-G: a Web-based debugger of MPI programs over Grid environments
Net-dbx-G is a tool that utilizes Java and other World Wide Web tools as an interface to Grid services to help Grid application developers debug their MPI programs from anywhere i...
Panayiotis Neophytou, Neophytos Neophytou, Paraske...