Sciweavers

12783 search results - page 2335 / 2557
» Experimenting with computing
Sort
View
RAID
1999
Springer
15 years 9 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
ECOOPW
1998
Springer
15 years 9 months ago
Evaluating OO-CASE Tools: OO Research Meets Practice
Current object-oriented CASE tools are useful for recording and gaining insight into OO models. They offer extensive support for especially the analysis and design of object-orien...
Danny Greefhorst, Mark van Elswijk, Mattijs Maat, ...
143
Voted
IPPS
1997
IEEE
15 years 9 months ago
Control Schemes in a Generalized Utility for Parallel Branch-and-Bound Algorithms
Branch-and-bound algorithms are general methods applicable to various combinatorial optimization problems and parallelization is one of the most hopeful methods to improve these a...
Yuji Shinano, Kenichi Harada, Ryuichi Hirabayashi
133
Voted
CHI
1997
ACM
15 years 9 months ago
The Rockin' Mouse: Integral 3D Manipulation on a Plane
A novel input device called the Rockin’Mouse is described and evaluated. The Rockin’Mouse is a four degree-of-freedom input device that has the same shape as a regular mouse e...
Ravin Balakrishnan, Thomas Baudel, Gordon Kurtenba...
154
Voted
CHI
1997
ACM
15 years 9 months ago
Sensing Activity in Video Images
in CHI’97 Extended Abstract, ACM Press, pp. 319-320 based awareness tools and iconic indicators because it meets three crucial user requirements. This paper describes the activit...
Alison Lee, Kevin Schlueter, Andreas Girgensohn
« Prev « First page 2335 / 2557 Last » Next »