Sciweavers

5722 search results - page 1066 / 1145
» Security Function Interactions
Sort
View
100
Voted
IJRR
2006
123views more  IJRR 2006»
15 years 2 months ago
Hybrid Control of the Berkeley Lower Extremity Exoskeleton (BLEEX)
The first functional load-carrying and energetically autonomous exoskeleton was demonstrated at U.C. Berkeley, walking at the average speed of 0.9 m/s (2 mph) while carrying a 34 ...
Hami Kazerooni, Ryan Steger, Lihua Huang
JOT
2008
136views more  JOT 2008»
15 years 2 months ago
The Stock Statistics Parser
This paper describes how use the HTMLEditorKit to perform web data mining on stock statistics for listed firms. Our focus is on making use of the web to get information about comp...
Douglas Lyon
132
Voted
TSE
2008
236views more  TSE 2008»
15 years 2 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
TWC
2008
154views more  TWC 2008»
15 years 2 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
TON
2008
108views more  TON 2008»
15 years 1 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
« Prev « First page 1066 / 1145 Last » Next »