Sciweavers

6696 search results - page 161 / 1340
» Securing social networks
Sort
View
HCI
2009
15 years 2 months ago
Open Collaborative Development: Trends, Tools, and Tactics
Abstract. Following the successful trend of open source, companies can be observed to open their innovation and development processes towards interested and capable partners inside...
Kathrin M. Moeslein, Angelika C. Bullinger, Jens S...
ICANN
2011
Springer
14 years 7 months ago
Robot Trajectory Prediction and Recognition Based on a Computational Mirror Neurons Model
Mirror neurons are premotor neurons that are considered to play a role in goal-directed actions, action understanding and even social cognition. As one of the promising research ar...
Junpei Zhong, Cornelius Weber, Stefan Wermter
CCS
2007
ACM
15 years 10 months ago
Towards automated provisioning of secure virtualized networks
Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramas...
114
Voted
STORAGESS
2006
ACM
15 years 10 months ago
Design, implementation and evaluation of security in iSCSI-based network storage systems
Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasub...
SP
1990
IEEE
15 years 8 months ago
A Network Security Monitor
L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt,...