Sciweavers

1121 search results - page 223 / 225
» Logics of Complementarity in Information Systems
Sort
View
CCS
2007
ACM
13 years 12 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
SIGCSE
2005
ACM
163views Education» more  SIGCSE 2005»
13 years 11 months ago
Using SeSFJava in teaching introductory network courses
Networking course projects are usually described by an informal specification and a collection of test cases. Students often misunderstand the specification or oversimplify it t...
Tamer Elsharnouby, A. Udaya Shankar
IWCMC
2009
ACM
13 years 10 months ago
Graph coloring based physical-cell-ID assignment for LTE networks
Autoconfiguration of the radio parameters is a key feature for next generation mobile networks. Especially for LTE the NGMN Forum has brought it up as a major requirement. It is ...
Tobias Bandh, Georg Carle, Henning Sanneck
PADS
1999
ACM
13 years 10 months ago
Shock Resistant Time Warp
In an attempt to cope with time-varying workload, traditional adaptive Time Warp protocols are designed to react in response to performance changes by altering control parameter c...
Alois Ferscha, James Johnson
KDD
2000
ACM
162views Data Mining» more  KDD 2000»
13 years 9 months ago
Data Mining from Functional Brain Images
Recent advances in functional brain imaging enable identication of active areas of a brain performing a certain function. Induction of logical formulas describing relations betwee...
Mitsuru Kakimoto, Chie Morita, Yoshiaki Kikuchi, H...