Sciweavers

2673 search results - page 464 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
NETGAMES
2006
ACM
14 years 3 months ago
Metazoa Ludens
— For better or worse, technological advancement has changed the world to the extent that at a professional level demands from the working executive required more hours either in...
Roger Thomas Kok Chuen Tan, James Keng Soon Teh, A...
C5
2004
IEEE
14 years 26 days ago
Scratch: A Sneak Preview
information technologies as "the ability to reformulate knowledge, to express oneself creatively and appropriately, and to produce and generate information (rather than simply...
John Maloney, Leo Burd, Yasmin B. Kafai, Natalie R...
SIGUCCS
2005
ACM
14 years 2 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 3 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 3 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...