Sciweavers

9071 search results - page 1716 / 1815
» A co-design modeling approach for computer network systems
Sort
View
TRIDENTCOM
2006
IEEE
15 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
15 years 3 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 2 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
BMCBI
2006
114views more  BMCBI 2006»
14 years 10 months ago
Epigenetic acquisition of inducibility of type III cytotoxicity in P. aeruginosa
Background: Pseudomonas aeruginosa, an opportunistic pathogen, is often encountered in chronic lung diseases such as cystic fibrosis or chronic obstructive pneumonia, as well as a...
Didier Filopon, Annabelle Mérieau, Gilles B...
WWW
2008
ACM
15 years 10 months ago
VoiKiosk: increasing reachability of kiosks in developing regions
One of the several initiatives to bridge the digital divide in developing countries has been the deployment of information kiosks or knowledge centers in villages in rural parts o...
Sheetal K. Agarwal, Arun Kumar, Amit Anil Nanavati...
« Prev « First page 1716 / 1815 Last » Next »