Sciweavers

13985 search results - page 2473 / 2797
» Active Feature Models
Sort
View
GROUP
2003
ACM
15 years 10 months ago
How people use orientation on tables: comprehension, coordination and communication
In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, orientatio...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...
126
Voted
SIGCOMM
2003
ACM
15 years 10 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
WSNA
2003
ACM
15 years 10 months ago
Cleaning and querying noisy sensors
Sensor networks have become an important source of data with numerous applications in monitoring various real-life phenomena as well as industrial applications and traffic contro...
Eiman Elnahrawy, Badri Nath
CCS
2003
ACM
15 years 10 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
ICNP
2002
IEEE
15 years 9 months ago
A Simple and Scalable Fair Bandwidth Sharing Mechanism for Multicast Flows
Despite a decade of research and development, multicast has not yet been deployed on a global scale. Among the difficulties with the current infrastructure are intermulticast fai...
Fethi Filali, Walid Dabbous
« Prev « First page 2473 / 2797 Last » Next »