Sciweavers

8575 search results - page 1445 / 1715
» A Model of Learning Using the Internet
Sort
View
OSDI
2008
ACM
16 years 4 months ago
Greening the Switch
Active research is being conducted in reducing power consumption of all the components of the Internet. To that end, we propose schemes for power reduction in network switches - T...
Ganesh Ananthanarayanan, Randy H. Katz
HICSS
2009
IEEE
173views Biometrics» more  HICSS 2009»
15 years 11 months ago
Effects of Task Types and Communication Support Tools on E-Negotiation Performance: A Task-Technology Fit Perspective
The rapid growth of the Internet has made computer-mediated communication popular and the use of e-negotiation systems (ENS) has attracted great attention from researchers and pra...
Her-Sen Doong, Hui-Chih Wang, Chi-Kuang Hsieh
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
DASFAA
2008
IEEE
109views Database» more  DASFAA 2008»
15 years 10 months ago
Discovering Spatial Interaction Patterns
Abstract. Advances in sensing and satellite technologies and the growth of Internet have resulted in the easy accessibility of vast amount of spatial data. Extracting useful knowle...
Chang Sheng, Wynne Hsu, Mong Lee, Anthony K. H. Tu...
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 10 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
« Prev « First page 1445 / 1715 Last » Next »