Sciweavers

638 search results - page 107 / 128
» Taming architectural evolution
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 25 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
14 years 25 days ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
ICPPW
2003
IEEE
14 years 25 days ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
ISMAR
2003
IEEE
14 years 25 days ago
Herding Sheep: Live System Development for Distributed Augmented Reality
In the past, architectures of Augmented Reality systems have been widely different and taylored to specific tasks. In this paper, we use the example of the SHEEP game to show how...
Asa MacWilliams, Christian Sandor, Martin Wagner, ...
IV
2003
IEEE
183views Visualization» more  IV 2003»
14 years 25 days ago
Visualisation of RDF(S)-based Information
As Resource Description Framework (RDF) reaches maturity, there is an increasing need for tools that support it. A common and natural representation for RDF data is a directed lab...
Alexandru Telea, Flavius Frasincar, Geert-Jan Houb...