Sciweavers

820 search results - page 110 / 164
» Techniques for Efficient Interactive Configuration of Distri...
Sort
View
UIST
2003
ACM
14 years 2 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley
BMCBI
2005
130views more  BMCBI 2005»
13 years 8 months ago
Squid - a simple bioinformatics grid
Background: BLAST is a widely used genetic research tool for analysis of similarity between nucleotide and protein sequences. This paper presents a software application entitled &...
Paulo C. Carvalho, Rafael V. Glória, Antoni...
MATA
2004
Springer
189views Communications» more  MATA 2004»
14 years 2 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
MSCS
2010
84views more  MSCS 2010»
13 years 7 months ago
Channel abstractions for network security
Abstractions for Network Security† MICH E L E B U G L I E S I, R I C C A R D O F O C A R D I Dipartimento di Informatica, Universit`a Ca’ Foscari, Venice. Received 6 October 20...
Michele Bugliesi, Riccardo Focardi
USS
2004
13 years 10 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson