Sciweavers

1358 search results - page 189 / 272
» Diverse Firewall Design
Sort
View
PADS
2005
ACM
15 years 5 months ago
Distributed Worm Simulation with a Realistic Internet Model
Internet worm spread is a phenomenon involving millions of hosts, who interact in complex and diverse environment. Scanning speed of each infected host depends on its resources an...
Songjie Wei, Jelena Mirkovic, D. Martin Swany
SC
2005
ACM
15 years 5 months ago
An Adaptive Visual Analytics Platform for Mobile Devices
We present the design and implementation of InfoStar, an adaptive visual analytics platform for mobile devices such as PDAs, laptops, Tablet PCs and mobile phones. InfoStar extends...
Antonio Sanfilippo, Richard May, Gary Danielson, B...
SIGCSE
2005
ACM
106views Education» more  SIGCSE 2005»
15 years 5 months ago
A model for improving secondary CS education
This paper describes how the Institute for Computing Education (ICE) at Georgia Tech is trying to improve the state of computer science education in secondary schools in Georgia. ...
Barbara Ericson, Mark Guzdial, Maureen Biggers
57
Voted
ATAL
2005
Springer
15 years 5 months ago
How local is that optimum? k-optimality for DCOP
In multi-agent systems where sets of joint actions (JAs) are generated, metrics are needed to evaluate these sets and efficiently allocate resources for the many JAs. For the case...
Jonathan P. Pearce, Rajiv T. Maheswaran, Milind Ta...
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
15 years 5 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann