Sciweavers

1931 search results - page 110 / 387
» Why we blog
Sort
View
ICGI
2004
Springer
14 years 3 months ago
Partial Learning Using Link Grammars Data
Abstract. Kanazawa has shown that several non-trivial classes of categorial grammars are learnable in Gold’s model. We propose in this article to adapt this kind of symbolic lear...
Erwan Moreau
ICPPW
2003
IEEE
14 years 3 months ago
Countering Rogues in Wireless Networks
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and Man-in-the-middle attacks (MITM). In this paper we show how wireless networks are...
Austin Godber, Partha Dasgupta
HOTOS
1999
IEEE
14 years 2 months ago
Drawing the Red Line in Java
Software-based protection has become a viable alternative to hardware-based protection in systems based on languages such as Java, but the absence of hardware mechanisms for prote...
Godmar Back, Wilson C. Hsieh
USS
2008
14 years 10 days ago
Research Challenges for the Security of Control Systems
In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirem...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
CHI
2004
ACM
14 years 10 months ago
Digital graffiti: public annotation of multimedia content
Our physical environment is increasingly filled with multimedia content on situated, community public displays. We are designing methods for people to post and acquire digital inf...
Scott Carter, Elizabeth F. Churchill, Laurent Deno...