Sciweavers

1618 search results - page 223 / 324
» Privacy Interfaces for Information Management
Sort
View
KES
1998
Springer
15 years 8 months ago
Hidden partitioning of a visual feedback-based neuro-controller
Robotic controllers take advantage from neural network learning capabilities as long as the dimensionality of the problem is kept moderate. This paper explores the possibilities of...
Jean-Philippe Urban, Jean-Luc Buessler, Julien Gre...
ICISS
2007
Springer
15 years 8 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
COOPIS
2004
IEEE
15 years 8 months ago
Application Adaptation Through Transparent and Portable Object Mobility in Java
This paper describes MobJeX, an adaptive Java based application framework that uses a combination of pre-processing and runtime support to provide transparent object mobility (incl...
Caspar Ryan, Christopher Westhorpe
101
Voted
OOIS
2000
Springer
15 years 8 months ago
Definition of External Schemas in ODMG Databases
Given that ODMG 3.0 specifications do not address the definition of external schemas, we are developing an external schema definition methodology for ODMG databases. In this paper...
Manuel Torres, José Samos
ELPUB
2008
ACM
15 years 6 months ago
Publishing scientific research: is there ground for new ventures?
This paper highlights some of the issues that have been reported in surveys carried out by the RIOJA (Repository Interface for Overlaid JournalArchives) project (http://www.ucl.ac...
Panayiota Polydoratou, Martin Moyle