Sciweavers

53390 search results - page 10533 / 10678
» Computer Systems Analysis
Sort
View
WWW
2009
ACM
16 years 5 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
MSWIM
2009
ACM
15 years 12 months ago
Directional neighbor discovery in 60 GHz indoor wireless networks
The unlicensed 60 GHz band brings the promise of multi-gigabit data rates to support new applications such as high definition video over wireless links. Signal propagation in the...
Jianxia Ning, Tae-Suk Kim, Srikanth V. Krishnamurt...
IFM
2007
Springer
129views Formal Methods» more  IFM 2007»
15 years 11 months ago
Slotted-Circus
Material Flow Abstraction of Manufacturing Systems. ‣Umberto Costa, Ivan de Medeiros Jr and Marcel Oliveira. Specification and Verification of a MPI Implementation for a MP-SoC...
Andrew Butterfield, Adnan Sherif, Jim Woodcock
124
Voted
SE
2007
15 years 6 months ago
Was ist Software-Architektur? Ein Abgleich mit der Praxis
: Einige der g¨angigen Auffassungen zu ” Was ist Software-Architektur?“ stimmen nicht ¨uberein mit Beobachtungen aus der industriellen Praxis der Software-Entwicklung – so ...
Dominikus Herzberg
CCS
2009
ACM
16 years 5 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
« Prev « First page 10533 / 10678 Last » Next »