Sciweavers

2503 search results - page 408 / 501
» Building Computer Network Attacks
Sort
View
AIED
2005
Springer
15 years 7 months ago
Tradeoff analysis between knowledge assessment approaches
Abstract: The problem of modeling and assessing an individual’s ability level is central to learning environments. Numerous approaches exists to this end. Computer Adaptive Testi...
Michel Desmarais, Shunkai Fu, Xiaoming Pu
89
Voted
IPTPS
2004
Springer
15 years 6 months ago
Making Peer-to-Peer Keyword Searching Feasible Using Multi-level Partitioning
—This paper discusses large scale keyword searching on top of peer-to-peer (P2P) networks. The state-of-the-art keyword searching techniques for unstructured and structured P2P s...
Shuming Shi, Guangwen Yang, Dingxing Wang, Jin Yu,...
ANSS
2003
IEEE
15 years 6 months ago
An ns-based Bluetooth Topology Construction Simulation Environment
Bluetooth is an emerging technology in wireless applications, and many related issues are yet to be explored both in academia and industry. Because of the complexity and the dynam...
Chia-Jui Hsu, Yuh-Jzer Joung
DBISP2P
2003
Springer
152views Database» more  DBISP2P 2003»
15 years 6 months ago
An Adaptive and Scalable Middleware for Distributed Indexing of Data Streams
Abstract. We are witnessing a dramatic increase in the use of datacentric distributed systems such as global grid infrastructures, sensor networks, network monitoring, and various ...
Ahmet Bulut, Roman Vitenberg, Fatih Emekçi,...
WORM
2003
15 years 2 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis