Sciweavers

141 search results - page 14 / 29
» Session Overview Mechanisms and Design
Sort
View
CCS
2008
ACM
13 years 9 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
HPCC
2010
Springer
13 years 5 months ago
Implementation and Evaluation of a NAT-Gateway for the General Internet Signaling Transport Protocol
The IETF's Next Steps in Signaling (NSIS) framework provides an up-to-date signaling protocol suite that can be used to dynamically install, maintain, and manipulate state in ...
Roland Bless, Martin Röhricht
KES
2004
Springer
14 years 26 days ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
EWCBR
2004
Springer
13 years 11 months ago
Using CBR for Semantic Analysis of Software Specifications
Abstract. Helping software designers in their task implies the development of tools with intelligent capabilities. One such capability is the integration of natural language unders...
Nuno Seco, Paulo Gomes, Francisco C. Pereira
CSCW
2004
ACM
14 years 28 days ago
Towards dynamic collaboration architectures
In this paper, we introduce the concept of dynamically changing between centralized, replicated, and hybrid collaboration architectures. It is implemented by providing users a fun...
Goopeel Chung, Prasun Dewan