Sciweavers

1581 search results - page 280 / 317
» Mechanizing Inductive Reasoning
Sort
View
SISW
2005
IEEE
15 years 3 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
WWW
2005
ACM
15 years 3 months ago
How to make web sites talk together: web service solution
Integrating web sites to provide more efficient services is a very promising way in the Internet. For example searching house for rent based on train system or preparing a holiday...
Hoang Pham Huy, Takahiro Kawamura, Tetsuo Hasegawa
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 3 months ago
Hapticat: exploration of affective touch
This paper describes the Hapticat , a device we developed to study affect through touch. Though intentionally not highly zoomorphic, the device borrows behaviors from pets and th...
Steve Yohanan, Mavis Chan, Jeremy Hopkins, Haibo S...
MDM
2004
Springer
15 years 3 months ago
Middleware Providing Dynamic Group Communication Facility for Cellular Phone Applications
In this paper, we propose a middleware library for efficiently developing distributed cooperative applications consisting of a large number of cellular phones with Java executors....
Kouji Nishigaki, Keiichi Yasumoto, Takaaki Umedu, ...
INFOCOM
2003
IEEE
15 years 3 months ago
Congestion Control Policies for IP-based CDMA Radio Access Networks
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...
Sneha Kumar Kasera, Ramachandran Ramjee, Sandra R....