Sciweavers

2095 search results - page 342 / 419
» Describing Groups
Sort
View
CN
2007
106views more  CN 2007»
15 years 5 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
COMCOM
2007
111views more  COMCOM 2007»
15 years 5 months ago
Failover, load sharing and server architecture in SIP telephony
We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively new IP telephony context. The paper compares various...
Kundan Singh, Henning Schulzrinne
129
Voted
IJMMS
2006
108views more  IJMMS 2006»
15 years 5 months ago
Computational modeling and experimental investigation of effects of compositional elements on interface and design aesthetics
This article describes computational modeling and two corresponding experimental investigations of the effects of symmetry, balance and quantity of construction elements on interf...
Michael Bauerly, Yili Liu
142
Voted
MAGS
2008
122views more  MAGS 2008»
15 years 5 months ago
Integrating embodied conversational agent components with a generic framework
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...
ENGL
2007
71views more  ENGL 2007»
15 years 5 months ago
Inductive Classifying Artificial Network for Fly Ash Type Categorization
Nowadays, fly ash is a common ingredient of concrete and may constitute up to 50% by weight of the total binder material. Incorporation of fly ash in Portland-cement concrete is hi...
M. C. Nataraja, M. A. Jayaram, C. N. Ravikumar