Sciweavers

6978 search results - page 1187 / 1396
» On Proofs in System P
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 10 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
ISI
2006
Springer
13 years 10 months ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...
IDA
2007
Springer
13 years 10 months ago
Inference of node replacement graph grammars
Graph grammars combine the relational aspect of graphs with the iterative and recursive aspects of string grammars, and thus represent an important next step in our ability to dis...
Jacek P. Kukluk, Lawrence B. Holder, Diane J. Cook
BC
2005
82views more  BC 2005»
13 years 10 months ago
Estimating position and velocity of a submerged moving object by the clawed frog Xenopus and by fish - A cybernetic approach
Thelateral-linesystemisauniquefacilityofaquatic animals to locate predator, prey, or conspecifics. We present a detailed model of how the clawed frog Xenopus, or fish, can localize...
Jan-Moritz P. Franosch, Andreas B. Sichert, Maria ...
« Prev « First page 1187 / 1396 Last » Next »