Sciweavers

7080 search results - page 361 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
SIGCOMM
2006
ACM
15 years 9 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
DEEC
2007
IEEE
15 years 10 months ago
BestChoice SRM: a simple and practical supplier relationship management system for e-procurement
Supplier relationship management (SRM) is an important contributor to a company’s efficiency and credibility. Although several ways are used to provide SRM functionality, these a...
Dongjoo Lee, Seungseok Kang, Sangkeun Lee, Young-g...
ACL
2012
13 years 6 months ago
Probabilistic Integration of Partial Lexical Information for Noise Robust Haptic Voice Recognition
This paper presents a probabilistic framework that combines multiple knowledge sources for Haptic Voice Recognition (HVR), a multimodal input method designed to provide efficient...
Khe Chai Sim
ICDCS
2003
IEEE
15 years 9 months ago
An Integrated Resource Sharing Policy for Multimedia Storage Servers Based on Network-Attached Disks
In this paper, we propose using the network-attached disk (NAD) architecture to design highly scalable and cost-effective multimedia-on-demand (MOD) servers. In order to ensure en...
Nabil J. Sarhan, Chita R. Das
ECSCW
2007
15 years 5 months ago
Exploring cooperation through a binder: A context for IT tools in elderly care at home
Abstract. This paper examines the empirical findings of a study of the work and cooperation taking place within and between the home help service and home health care in a Swedish ...
Alexandra Petrakou