Sciweavers

1739 search results - page 252 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
147
Voted
KDD
2003
ACM
233views Data Mining» more  KDD 2003»
16 years 4 months ago
SEWeP: using site semantics and a taxonomy to enhance the Web personalization process
Web personalization is the process of customizing a Web site to the needs of each specific user or set of users, taking advantage of the knowledge acquired through the analysis of...
Magdalini Eirinaki, Michalis Vazirgiannis, Iraklis...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Self-Managed Cell: A Middleware for Managing Body-Sensor Networks
Abstract— Body sensor networks consisting of low-power onbody wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patient...
Sye Loong Keoh, Naranker Dulay, Emil Lupu, Kevin P...
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
180
Voted
CIMCA
2006
IEEE
15 years 10 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
SOUPS
2006
ACM
15 years 10 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker