Sciweavers

7080 search results - page 1249 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
JUCS
2008
163views more  JUCS 2008»
15 years 3 months ago
Authoring Social-aware Tasks on Active Spaces
: Social-aware computing is an emerging trend based on ubiquitous computing technologies and collaborative work. A successful design demands a better understanding of group tasks, ...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
155
Voted
IJIPT
2010
147views more  IJIPT 2010»
15 years 1 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
119
Voted
MOC
2010
14 years 10 months ago
Entropy-satisfying relaxation method with large time-steps for Euler IBVPs
This paper could have been given the title: "How to positively and implicitly solve Euler equations using only linear scalar advections." The new relaxation method we pr...
Frédéric Coquel, Quang Long Nguyen, ...
IJAHUC
2011
143views more  IJAHUC 2011»
14 years 6 months ago
A mobility framework to improve heterogeneous wireless network services
: We propose and investigate the Internet Protocol version 6 (IPv6) enabled mobility framework to improve the user mobility experience in heterogenous wireless networks. The framew...
Chong Shen, Wencai Du, Robert Atkinson, James Irvi...
127
Voted
WSC
1998
15 years 4 months ago
Communication Mission-type Orders to Virtual Commanders
This paper discusses issues in modeling C4I and cognitive processes in next generation simulations and applications to Force XXI command and control. We propose a modification to ...
Martin S. Kleiner, Scott A. Carey, Joseph E. Beach
« Prev « First page 1249 / 1416 Last » Next »