Sciweavers

3154 search results - page 613 / 631
» An annotation based approach to support design communication
Sort
View
CCS
2003
ACM
15 years 3 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ECIS
2000
14 years 11 months ago
Multimedia Case Studies: Development and Use in Management Education
- The paper discusses the role of multimedia case studies in management education basing on direct experiences derived from an on going E.U. project. Literature has analysed in dep...
Paola Bielli, Stefano Basaglia
CORR
2010
Springer
180views Education» more  CORR 2010»
14 years 10 months ago
Dependability in Aggregation by Averaging
Abstract. Aggregation is an important building block of modern distributed applications, allowing the determination of meaningful properties (e.g. network size, total storage capac...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
IMC
2010
ACM
14 years 7 months ago
Eyeball ASes: from geography to connectivity
This paper presents a new approach to determine the geographical footprint of individual Autonomous Systems that directly provide service to end-users, i.e.,eyeball ASes. The key ...
Amir H. Rasti, Nazanin Magharei, Reza Rejaie, Walt...
EGITALY
2006
14 years 11 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...