Sciweavers

4029 search results - page 792 / 806
» Experience with Software Watermarking
Sort
View
DKE
2007
82views more  DKE 2007»
14 years 11 months ago
Eliciting information for product modeling using process modeling
A product model is a formal and structured definition of product information. The most common procedure for defining a product data model is to first describe the business and/...
Ghang Lee, Charles M. Eastman, Rafael Sacks
JPDC
2006
253views more  JPDC 2006»
14 years 11 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
ENTCS
2007
113views more  ENTCS 2007»
14 years 11 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
SIGIR
2008
ACM
14 years 11 months ago
Relevance assessment: are judges exchangeable and does it matter
We investigate to what extent people making relevance judgements for a reusable IR test collection are exchangeable. We consider three classes of judge: "gold standard" ...
Peter Bailey, Nick Craswell, Ian Soboroff, Paul Th...
IJMMS
2007
195views more  IJMMS 2007»
14 years 11 months ago
Berlin Brain-Computer Interface - The HCI communication channel for discovery
The investigation of innovative Human–Computer Interfaces (HCI) provides a challenge for future interaction research and development. Brain–Computer Interfaces (BCIs) exploit ...
Roman Krepki, Gabriel Curio, Benjamin Blankertz, K...