Sciweavers

8636 search results - page 1500 / 1728
» How Developers Copy
Sort
View
139
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
136
Voted
VISUALIZATION
2003
IEEE
15 years 9 months ago
A Visual Exploration Process for the Analysis of Internet Routing Data
The Internet pervades many aspects of our lives and is becoming indispensable to critical functions in areas such as commerce, government, production and general information disse...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu
116
Voted
GROUP
2003
ACM
15 years 9 months ago
Studying the effect of similarity in online task-focused interactions
Although the Internet provides powerful tools for social interactions, many tasks—for example, information-seeking—are undertaken as solitary activities. Information seekers a...
Dan Cosley, Pamela J. Ludford, Loren G. Terveen
127
Voted
IUI
2003
ACM
15 years 9 months ago
Lessons learned in modeling schizophrenic and depressed responsive virtual humans for training
This paper describes lessons learned in developing the linguistic, cognitive, emotional, and gestural models underlying virtual human behavior in a training application designed t...
Robert C. Hubal, Geoffrey A. Frank, Curry I. Guinn
128
Voted
SENSYS
2003
ACM
15 years 9 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
« Prev « First page 1500 / 1728 Last » Next »