Sciweavers

505 search results - page 26 / 101
» Message from General Co-Chairs
Sort
View
WOWMOM
2006
ACM
150views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
Abstract— A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryp...
Murat Demirbas, Youngwhan Song
HICSS
1994
IEEE
127views Biometrics» more  HICSS 1994»
14 years 1 months ago
Angel: Resource Unification in a.64-bit Microkernel
The appearance of 64-bit processors allows a new approach to microkernel desagn From our experience with a message passang microkernel MESHIX, we discovered that a multi-address s...
Kevin Murray, Tim Wilkinson, Tom Stiemerling, Paul...
FLAIRS
2008
13 years 11 months ago
Graph Grammars: An ITS Technology for Diagram Representations
For many educational applications such as learning tools for argumentation, structured diagrams are a suitable form of external representation. However, student-created graphs pos...
Niels Pinkwart, Kevin D. Ashley, Vincent Aleven, C...
IUI
2009
ACM
14 years 3 months ago
Discovering frequent work procedures from resource connections
Intelligent desktop assistants could provide more help for users if they could learn models of the users’ workflows. However, discovering desktop workflows is difficult becau...
Jianqiang Shen, Erin Fitzhenry, Thomas G. Dietteri...
ICS
2010
Tsinghua U.
14 years 6 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer