Sciweavers

88 search results - page 5 / 18
» enter 2009
Sort
View
ICHIT
2009
Springer
14 years 4 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
HUC
2009
Springer
14 years 2 months ago
The commodification of location: dynamics of power in location-based systems
Location-based ubiquitous computing systems are entering mainstream society and becoming familiar parts of everyday life. However, the settings in which they are deployed are alre...
Irina Shklovski, Janet Vertesi, Emily Troshynski, ...
CISSE
2009
Springer
14 years 1 months ago
Educational Virtual Reality through a Multiview Autostereoscopic 3D Display
: Nowadays the virtual reality technology is a topic of present and is an interest for research and development. There are different devices with which the user may enter, observe ...
Emiliyan G. Petkov
IAT
2009
IEEE
14 years 1 months ago
Developing a Deterministic Patrolling Strategy for Security Agents
Abstract—Developing autonomous systems that patrol environments for detecting intruders is a topic of increasing relevance in security applications. An important aspect of these ...
Nicola Basilico, Nicola Gatti, Francesco Amigoni
EDM
2009
132views Data Mining» more  EDM 2009»
13 years 7 months ago
Predicting Students Drop Out: A Case Study
The monitoring and support of university freshmen is considered very important at many educational institutions. In this paper we describe the results of the educational data minin...
Gerben Dekker, Mykola Pechenizkiy, Jan Vleeshouwer...