Sciweavers

8600 search results - page 1422 / 1720
» Measuring with Timed Patterns
Sort
View
118
Voted
COLCOM
2009
IEEE
15 years 9 months ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño
COMPSAC
2009
IEEE
15 years 9 months ago
Modeling and Predicting Software Failure Costs
—For software, the costs of failures are not clearly understood. Often, these costs disappear in the costs of testing, the general developments costs, or the operating expenses. ...
Michael Grottke, Christian A. Graf
DIM
2009
ACM
15 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
IUI
2009
ACM
15 years 9 months ago
Simplified facial animation control utilizing novel input devices: a comparative study
Editing facial expressions of virtual characters is quite a complex task. The face is made up of many muscles, which are partly activated concurrently. Virtual faces with human exp...
Nikolaus Bee, Bernhard Falk, Elisabeth André
MOBIWAC
2009
ACM
15 years 9 months ago
Adaptive, direction-aware data dissemination for diverse sensor mobility
We consider sensor networks where the sensor nodes are attached on entities that move in a highly dynamic, heterogeneous manner. To capture this mobility diversity we introduce a ...
Azzedine Boukerche, Dionysios Efstathiou, Sotiris ...
« Prev « First page 1422 / 1720 Last » Next »