Sciweavers

1170 search results - page 40 / 234
» Between ends and fibers
Sort
View
ACSAC
2009
IEEE
15 years 8 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
ANCS
2008
ACM
15 years 4 months ago
On design of bandwidth scheduling algorithms for multiple data transfers in dedicated networks
The significance of high-performance dedicated networks has been well recognized due to the rapidly increasing number of large-scale applications that require high-speed data tran...
Yunyue Lin, Qishi Wu
DSN
2008
IEEE
15 years 8 months ago
A study of cognitive resilience in a JPEG compressor
Many classes of applications are inherently tolerant to errors. One such class are applications designed for a human end user, where the capabilities of the human cognitive system...
Damian Nowroth, Ilia Polian, Bernd Becker
IUI
2000
ACM
15 years 6 months ago
User studies of an interdependency-based interface for acquiring problem-solving knowledge
This paper describes a series of experiments with a range of users to evaluate an intelligent interface for acquiring problem-solving knowledge to describe how to accomplish a tas...
Jihie Kim, Yolanda Gil
CRISIS
2009
14 years 11 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...