Sciweavers

10674 search results - page 2108 / 2135
» The Virtual Environment - Another Approach
Sort
View
MM
2010
ACM
148views Multimedia» more  MM 2010»
13 years 7 months ago
TwitterSigns: microblogging on the walls
In this paper we present TwitterSigns, an approach to display microblogs on public displays. Two different kinds of microblog entries (tweets) are selected for display: Tweets tha...
Markus Buzeck, Jörg Müller
CMS
2010
150views Communications» more  CMS 2010»
13 years 7 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 7 months ago
Trust-Based Adaptation in Complex Service-Oriented Systems
Abstract—Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based inter...
Florian Skopik, Daniel Schall, Schahram Dustdar
ESORICS
2010
Springer
13 years 7 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
AAI
2007
132views more  AAI 2007»
13 years 7 months ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...
« Prev « First page 2108 / 2135 Last » Next »