Sciweavers

268 search results - page 46 / 54
» Locating Hidden Groups in Communication Networks Using Hidde...
Sort
View
MSWIM
2006
ACM
14 years 1 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
IEEEVAST
2010
13 years 2 months ago
A visual analytics approach to model learning
The process of learning models from raw data typically requires a substantial amount of user input during the model initialization phase. We present an assistive visualization sys...
Supriya Garg, I. V. Ramakrishnan, Klaus Mueller
AAAIDEA
2005
IEEE
14 years 1 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
IAT
2008
IEEE
13 years 7 months ago
nAble Adaptive Scaffolding Agent - Intelligent Support for Novices
Scaffolding techniques allow human instructors to support novice learners in critical early stages, and to remove that support as expertise grows. This paper describes nAble, an a...
Joseph MacInnes, Stephanie Santosa, Nathan Kronenf...