Sciweavers

7118 search results - page 1073 / 1424
» Electrical and Computer Engineering
Sort
View
CONEXT
2006
ACM
15 years 7 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
DCOSS
2006
Springer
15 years 7 months ago
MobiRoute: Routing Towards a Mobile Sink for Improving Lifetime in Sensor Networks
Improving network lifetime is a fundamental challenge of wireless sensor networks. One possible solution consists in making use of mobile sinks. Whereas theoretical analysis shows...
Jun Luo, Jacques Panchard, Michal Piórkowsk...
133
Voted
DIS
2006
Springer
15 years 7 months ago
Scientific Discovery: A View from the Trenches
One of the primary goals in discovery science is to understand the human scientific reasoning processes. Despite sporadic success of automated discovery systems, few studies have s...
Catherine Blake, Meredith Rendall
DRM
2006
Springer
15 years 7 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
EDOC
2006
IEEE
15 years 7 months ago
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows
Abstract-- Analysis of workflows in terms of structural correctness is important for ensuring the quality of workflow models. Typically, this analysis is only one step in a larger ...
Rainer Hauser, Michael Friess, Jochen Malte Kü...
« Prev « First page 1073 / 1424 Last » Next »