Sciweavers

2747 search results - page 119 / 550
» Network externalities in software systems
Sort
View
DSN
2005
IEEE
15 years 10 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICANN
2007
Springer
15 years 11 months ago
Local Positioning System Based on Artificial Neural Networks
This work describes a complete indoor location system, from its creation, development and deployment. This location system is a capable way of retrieving the position of wireless d...
Pedro Claro, Nuno Borges Carvalho
HAPTICS
2005
IEEE
15 years 10 months ago
The Maxima Haptics Package -- A Tool for Symbolic Analysis of Haptics and Teleoperation
The Maxima Haptics Package is a free software package for symbolic analysis of linear models of haptic devices and teleoperators. From a mechanical model of the haptic device, the...
Göran A. V. Christiansson
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
15 years 10 months ago
Modeling the User Acceptance of E-Mail
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
Geoffrey S. Hubona, Andrew Burton-Jones
PLDI
2000
ACM
15 years 9 months ago
Caching function calls using precise dependencies
This paper describes the implementation of a purely functional programming language for building software systems. In this language, external tools like compilers and linkers are ...
Allan Heydon, Roy Levin, Yuan Yu