Sciweavers

557 search results - page 40 / 112
» Two experiences designing for effective security
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
SIGCPR
2003
ACM
183views Hardware» more  SIGCPR 2003»
14 years 1 months ago
ERP training strategies: conceptual training and the formation of accurate mental models
Enterprise Resource Planning (ERP) systems are large, complex integrated software applications that often take years to implement. This study examined a major determinant of succe...
Tony Coulson, Conrad Shayo, Lorne Olfman, C. E. Ta...
ICIP
2005
IEEE
14 years 10 months ago
Multi-view face pose classification by tree-structured classifier
In this paper, a multi-view face pose classification method is introduced. Each face region is normalized by two eye-centers and mouth center, and then multi-class classifiers are...
Zhiguang Yang, Haizhou Ai, Takuya Okamoto, Shihong...
ACSAC
2006
IEEE
14 years 13 days ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
MOBISYS
2008
ACM
14 years 8 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...