Sciweavers

3378 search results - page 499 / 676
» A universe of binding and computation
Sort
View
IAW
2003
IEEE
15 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICPP
2003
IEEE
15 years 3 months ago
Exploiting Client Caches: An Approach to Building Large Web Caches
New demands brought by the continuing growth of the Internet will be met in part by more effective and comprehensive use of caching. This paper proposes to exploit client browser ...
Yingwu Zhu, Yiming Hu
SIGUCCS
2003
ACM
15 years 3 months ago
Making online training and support easier for everyone with viewlets
Online training and support objects can be difficult and timeconsuming to create. Written words are often ignored by users who want someone to show them a procedure. Viewlets are ...
Janice Ward
DANCE
2002
IEEE
15 years 3 months ago
Design and Evaluation of a High Performance Dynamically Extensible Router
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis...
Fred Kuhns, John D. DeHart, Anshul Kantawala, Ralp...
GI
2009
Springer
15 years 2 months ago
SYGo - A Location-Based Game Adapted from the Board Game Scotland Yard
Abstract. In this paper we introduce SYGo, an innovative hide-andseek game which is part of the AMOGA research project of the University of Bonn in cooperation with and funded by D...
Mark Schmatz, Katja Henke, Clemens Türck, Chr...