Sciweavers

3524 search results - page 665 / 705
» Issues in Active Databases
Sort
View
CSCL
2008
106views more  CSCL 2008»
14 years 12 months ago
Operationalizing macro-scripts in CSCL technological settings
: This paper presents a conceptual analysis of the technological dimensions related to the operationalization of CSCL macro-scripts. CSCL scripts are activity models that aim at en...
Pierre Tchounikine
COMCOM
2006
138views more  COMCOM 2006»
14 years 12 months ago
Reducing memory fragmentation in network applications with dynamic memory allocators optimized for performance
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...
COMCOM
2006
88views more  COMCOM 2006»
14 years 12 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
IIE
2007
120views more  IIE 2007»
14 years 11 months ago
Words are Silver, Mouse-Clicks are Gold? (or how to optimize the level of language formalization of young students in a Logo-bas
How do we teach children to express and communicate ideas in a formal and informal mode? What type of language do they need in a concrete context? How should they determine a prope...
Evgenia Sendova, Toni Chehlarova, Pavel Boytchev
PR
2006
78views more  PR 2006»
14 years 11 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...