Sciweavers

2990 search results - page 583 / 598
» Thresholding for Change Detection
Sort
View
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
13 years 10 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
IM
1997
13 years 10 months ago
Conflict Analysis for Management Policies
Policies are a means of influencing management behaviour within a distributed system, without coding the behaviour into the managers. Authorisation policies specify what activitie...
Emil Lupu, Morris Sloman
WSC
2000
13 years 10 months ago
SNOOPy Calendar Queue
Discrete event simulations often require a future event list structure to manage events according to their timestamp. The choice of an efficient data structure is vital to the per...
Kah Leong Tan, Ian Li-Jin Thng
DIM
2008
ACM
13 years 9 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
MM
2010
ACM
148views Multimedia» more  MM 2010»
13 years 8 months ago
TwitterSigns: microblogging on the walls
In this paper we present TwitterSigns, an approach to display microblogs on public displays. Two different kinds of microblog entries (tweets) are selected for display: Tweets tha...
Markus Buzeck, Jörg Müller