Sciweavers

5856 search results - page 714 / 1172
» Developing Query Patterns
Sort
View
ISCAPDCS
2004
15 years 5 months ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee
COGSCI
2010
88views more  COGSCI 2010»
15 years 4 months ago
Domain-Creating Constraints
The contributions to this special issue on cognitive development collectively propose ways in which learning involves developing constraints that shape subsequent learning. A lear...
Robert L. Goldstone, David Landy
TCAD
2008
201views more  TCAD 2008»
15 years 4 months ago
Bitmask-Based Code Compression for Embedded Systems
Embedded systems are constrained by the available memory. Code-compression techniques address this issue by reducing the code size of application programs. It is a major challenge ...
Seok-Won Seong, Prabhat Mishra
ICFEM
2010
Springer
15 years 3 months ago
Model-Driven Protocol Design Based on Component Oriented Modeling
Abstract. Due to new emerging areas in the communication field there is a constant need for the design of novel communication protocols. This demands techniques for a rapid and eff...
Prabhu Shankar Kaliappan, Hartmut König, Seba...
NLDB
2010
Springer
15 years 2 months ago
Extracting Meronymy Relationships from Domain-Specific, Textual Corporate Databases
Abstract. Various techniques for learning meronymy relationships from opendomain corpora exist. However, extracting meronymy relationships from domain-specific, textual corporate d...
Ashwin Ittoo, Gosse Bouma, Laura Maruster, Hans Wo...