Sciweavers

2503 search results - page 382 / 501
» Building Computer Network Attacks
Sort
View
96
Voted
ICDCSW
2005
IEEE
15 years 7 months ago
Visual Code Widgets for Marker-Based Interaction
We present a set of graphical user interface elements, called widgets, for 2-dimensional visual codes. The proposed widgets are suitable for printing on paper as well as showing o...
Michael Rohs
POLICY
2005
Springer
15 years 7 months ago
Approximating Service Utility from Policies and Value Function Patterns
Service-oriented computing provides the right means for building flexible systems that allow dynamic configuration and on-the-fly composition. In order to realize this vision, ...
Steffen Lamparter, Daniel Oberle, Andreas Eberhart
AWCC
2004
Springer
15 years 7 months ago
Analyzing Web Interfaces of Databases for Retrieving Web Information
Abstract. Much of the information on the web is indeed dynamic content provided through linkups with databases. However, due to heterogeneity of databases, it is difficult to provi...
Jeong-Oog Lee, Myeong-Cheol Ko, Jinsoo Kim, Chang-...
IPPS
1998
IEEE
15 years 5 months ago
Capturing the Connectivity of High-Dimensional Geometric Spaces by Parallelizable Random Sampling Techniques
Abstract. Finding paths in high-dimensional gemetric spaces is a provably hard problem. Recently, a general randomized planning scheme has emerged as an e ective approach to solve ...
David Hsu, Lydia E. Kavraki, Jean-Claude Latombe, ...
ICDCS
1997
IEEE
15 years 5 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh