Sciweavers

5615 search results - page 1049 / 1123
» Active Learner Modelling
Sort
View
122
Voted
KBSE
2005
IEEE
15 years 9 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments
Ubiquitous Computing Environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds o...
Chetan Shiva Shankar, Anand Ranganathan, Roy H. Ca...
DIGRA
2005
Springer
15 years 8 months ago
Framing Virtual Law
Building on the work of games theorists and virtual world designers, this paper proposes a framework for understanding the real-virtual dichotomy in terms of a series of five fram...
Peter Edelmann
145
Voted
IPTPS
2005
Springer
15 years 8 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
150
Voted
MHCI
2004
Springer
15 years 8 months ago
Mobile Context Aware Systems: The Intelligence to Support Tasks and Effectively Utilise Resources
: The complex usage of mobile devices coupled with their limited resources in terms of display and processing suggests that being able to understand the context of the user would b...
Russell Beale, Peter Lonsdale
« Prev « First page 1049 / 1123 Last » Next »