Sciweavers

20024 search results - page 3692 / 4005
» Database Management Systems
Sort
View
126
Voted
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 9 months ago
A First Person IP over HDSL Case Study
As many authors have articulated, the “last mile problem” is often cited as a persistent engineering obstacle in deploying residential broadband solutions. Additionally, some ...
Wayne Smith
200
Voted
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 9 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
IAW
2003
IEEE
15 years 9 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
ICEIS
2003
IEEE
15 years 9 months ago
Knowledge Construction in E-Learning - Designing an E-Learning Environment
: In the traditional classroom, students learned to depend on tutors for their motivation, direction, goal setting, progress monitoring, self-assessment, and achievement. A fundame...
Kecheng Liu, Shirley Williams, Lily Sun
INFOCOM
2003
IEEE
15 years 9 months ago
Turning Heterogeneity into an Advantage in Overlay Routing
Abstract— Distributed hash table (DHT)-based overlay networks, represented by Pastry, CAN, and Chord, offer an administration-free and fault-tolerant application-level overlay ne...
Zhichen Xu, Mallik Mahalingam, Magnus Karlsson
« Prev « First page 3692 / 4005 Last » Next »