Sciweavers

306 search results - page 38 / 62
» Effects as sessions, sessions as effects
Sort
View
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
15 years 4 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
FLAIRS
2004
15 years 1 months ago
The Power of Experience: On the Usefulness of Validation Knowledge
TURING Test technologies are promising ways to validate AI systems which may have no alternative way to indicate validity. Human experts (validators) are often too expensive to in...
Rainer Knauf, Setsuo Tsuruta, Kenichi Uehara, Taka...
SIGCOMM
2010
ACM
15 years 18 days ago
SIP overload control: a backpressure-based approach
Overload happens in Session Initiation Protocol (SIP) networks when SIP servers have insufficient resources to handle all messages they receive. Under overload, SIP networks suffe...
Yaogong Wang
WWW
2009
ACM
16 years 1 months ago
Search shortcuts: driving users towards their goals
Giving suggestions to users of Web-based services is a common practice aimed at enhancing their navigation experience. Major Web Search Engines usually provide Suggestions under t...
Ranieri Baraglia, Fidel Cacheda, Victor Carneiro, ...
74
Voted
CHI
2001
ACM
16 years 23 days ago
GeneyTM: designing a collaborative activity for the palmTM handheld computer
This paper describes a project to explore issues surrounding the development of a collaborative handheld educational application for children. A user-centered, iterative design pr...
Arman Danesh, Kori Inkpen, Felix Lau, Keith Shu, K...