Sciweavers

981 search results - page 92 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
GLOBAL
2003
Springer
15 years 9 months ago
UML for Global Computing
Global systems – systems which may operate over transient networks including mobile elements and in which computation itself may be mobile – are gaining in importance. Neverthe...
Hubert Baumeister, Nora Koch, Piotr Kosiuczenko, P...
CCS
2010
ACM
15 years 7 months ago
Scene tagging: image-based CAPTCHA using image composition and object relationships
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
Peter Matthews, Cliff Changchun Zou
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
15 years 10 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
117
Voted
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 4 months ago
SHIELD: Social sensing and Help In Emergency using mobiLe Devices
School and College campuses face a perceived threat of violent crimes and require a realistic plan against unpredictable emergencies and disasters. Existing emergency systems (e.g....
Gautam S. Thakur, Mukul Sharma, Ahmed Helmy
WEBDB
2009
Springer
172views Database» more  WEBDB 2009»
15 years 11 months ago
PrivatePond: Outsourced Management of Web Corpuses
With the rise of cloud computing, it is increasingly attractive for end-users (organizations and individuals) to outsource the management of their data to a small number of larges...
Daniel Fabbri, Arnab Nandi, Kristen LeFevre, H. V....