Sciweavers

483 search results - page 82 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
SIGUCCS
2003
ACM
15 years 2 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
MHCI
2009
Springer
15 years 4 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
JSS
2007
169views more  JSS 2007»
14 years 9 months ago
MDABench: Customized benchmark generation using MDA
This paper describes an approach for generating customized benchmark suites from a software architecture description following a Model Driven Architecture (MDA) approach. The benc...
Liming Zhu, Ngoc Bao Bui, Yan Liu, Ian Gorton
AROBOTS
2010
194views more  AROBOTS 2010»
14 years 7 months ago
Computationally efficient solutions for tracking people with a mobile robot: an experimental evaluation of Bayesian filters
Abstract Modern service robots will soon become an essential part of modern society. As they have to move and act in human environments, it is essential for them to be provided wit...
Nicola Bellotto, Huosheng Hu
WORM
2003
14 years 10 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley