Sciweavers

356 search results - page 53 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
ICMI
2005
Springer
143views Biometrics» more  ICMI 2005»
14 years 1 months ago
A look under the hood: design and development of the first SmartWeb system demonstrator
Experience shows that decisions in the early phases of the development of a multimodal system prevail throughout the life-cycle of a project. The distributed architecture and the ...
Norbert Reithinger, Simon Bergweiler, Ralf Engel, ...
LOCA
2005
Springer
14 years 1 months ago
Context Modelling and Management in Ambient-Aware Pervasive Environments
Services in pervasive computing systems must evolve so that they become minimally intrusive and exhibit inherent proactiveness and dynamic adaptability to the current conditions, u...
Maria Strimpakou, Ioanna Roussaki, Carsten Pils, M...
VIZSEC
2005
Springer
14 years 1 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
HUC
2005
Springer
14 years 1 months ago
A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping
The ubiquitous computing community has widely researched the use of 802.11 for the purpose of location inference. Meanwhile, Bluetooth is increasingly widely deployed due to its lo...
Anil Madhavapeddy, Alastair Tse
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 1 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...