Sciweavers

483 search results - page 59 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
14 years 11 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
CIT
2007
Springer
15 years 6 months ago
An 802.11 Based MAC Protocol for Providing QoS to Real Time Applications
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Mayank Mishra, Anirudha Sahoo
MM
2009
ACM
196views Multimedia» more  MM 2009»
15 years 6 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
CHI
2007
ACM
16 years 6 days ago
Persona based rapid usability kick-off
The paper reports on the evaluation of a rapid usability kick-off technique (RUKO). Ten mobile service development projects in the company applied the technique during the early a...
Nina Khalayli, Silja Nyhus, Kari Hamnes, Tone Teru...
LAWEB
2006
IEEE
15 years 5 months ago
Model-Based Design of Volatile Functionality in Web Applications
In this paper we present a model-based approach to integrate dynamic and volatile functionality in Web Applications. Our approach comprises an extension to the OOHDM design method...
Gustavo Rossi, Andres Nieto, Luciano Mengoni, Nahu...