Sciweavers

306 search results - page 38 / 62
» Effects as sessions, sessions as effects
Sort
View
85
Voted
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
15 years 1 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
70
Voted
FLAIRS
2004
14 years 11 months ago
The Power of Experience: On the Usefulness of Validation Knowledge
TURING Test technologies are promising ways to validate AI systems which may have no alternative way to indicate validity. Human experts (validators) are often too expensive to in...
Rainer Knauf, Setsuo Tsuruta, Kenichi Uehara, Taka...
SIGCOMM
2010
ACM
14 years 10 months ago
SIP overload control: a backpressure-based approach
Overload happens in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all messages they receive. Under overload, SIP networks suffe...
Yaogong Wang
WWW
2009
ACM
15 years 11 months ago
Search shortcuts: driving users towards their goals
Giving suggestions to users of Web-based services is a common practice aimed at enhancing their navigation experience. Major Web Search Engines usually provide Suggestions under t...
Ranieri Baraglia, Fidel Cacheda, Victor Carneiro, ...
CHI
2001
ACM
15 years 10 months ago
GeneyTM: designing a collaborative activity for the palmTM handheld computer
This paper describes a project to explore issues surrounding the development of a collaborative handheld educational application for children. A user-centered, iterative design pr...
Arman Danesh, Kori Inkpen, Felix Lau, Keith Shu, K...