Sciweavers

4190 search results - page 670 / 838
» Implementing commitment-based interactions
Sort
View
152
Voted
LISA
2008
15 years 5 months ago
Automatic Software Fault Diagnosis by Exploiting Application Signatures
Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs. While application pr...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
125
Voted
WSC
2007
15 years 5 months ago
Enabling smooth and scalable dynamic 3d visualization of discrete-event construction simulations in outdoor augmented reality
Visualization is a powerful method for verifying, validating, and communicating the results of a simulated model. Lack of visual understanding about a simulated model is one of th...
Amir H. Behzadan, Vineet R. Kamat
113
Voted
WSC
2007
15 years 5 months ago
A simulation model with a low level of detail for container terminals and its applications
As trade among countries grows, the performance of container terminals is becoming more important than ever. In this paper, we present a 3D real-time-visualization containertermin...
Byung-Hyun Ha, Eun-Jung Park, Chan-Hee Lee
113
Voted
USS
2008
15 years 5 months ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
120
Voted
USS
2008
15 years 5 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov