Sciweavers

4134 search results - page 394 / 827
» Collaborative Practice Research
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
164
Voted
ICMCS
2005
IEEE
87views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Performance of Multiple Description Coding in Sensor Networks with Finite Buffers
Sensor networks are usually dense networks where the network diversity can be exploited in order to overcome failures. In this paper, we study the use of multiple description tech...
Enrico Baccaglini, Guillermo Barrenetxea, Baltasar...
PDC
2004
ACM
15 years 10 months ago
Examining a planning discourse: how a manager represents issues within a planning frame and how the others could do the same
The aim of Participatory Design (PD) is to involve the users in the design. Even though the research has shown the success of PD projects in empowering users, little has been said...
Jarmo Sarkkinen
130
Voted
INFOCOM
2003
IEEE
15 years 10 months ago
The Impact of Correlated Link Weights on QoS Routing
Abstract— Finding a path in a network based on multiple constraints (the MCP problem) is often referred to as QoS routing. QoS routing with constraints on multiple additive metri...
Fernando A. Kuipers, Piet Van Mieghem
IPPS
1999
IEEE
15 years 9 months ago
A Structured Approach to Parallel Programming: Methodology and Models
Parallel programming continues to be difficult, despite substantial and ongoing research aimed at making it tractable. Especially dismaying is the gulf between theory and the pract...
Berna L. Massingill