Sciweavers

2747 search results - page 232 / 550
» Network externalities in software systems
Sort
View
96
Voted
RAID
2007
Springer
15 years 7 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
127
Voted
IAT
2006
IEEE
15 years 6 months ago
A Multi-Agent Approach to Social Human Behaviour in Children's Play
This paper introduces a multi-agent system (MAS) approach for modelling social behaviours in children’s play. The children, the dynamics of their play, and the playground are mo...
Frodi Hammer, Alireza Derakhshan, Yves Demazeau, H...
INFOCOM
2005
IEEE
15 years 6 months ago
Pricing differentiated Internet services
— One of the critical challenges facing the networking industry today is to increase the profitability of Internet services. One well-known method in economics for increasing th...
Linhai He, Jean C. Walrand
76
Voted
DIAGRAMS
2004
Springer
15 years 6 months ago
A Cognitive Processing Perspective on Student Programmers' 'Graphicacy'
The ‘graphicacy’ of student programmers was investigated using several cognitive tasks designed to assess ER knowledge representation at the perceptual, semantic and output lev...
Richard Cox, Pablo Romero, Benedict du Boulay, Rud...
ASPLOS
1996
ACM
15 years 5 months ago
Synchronization and Communication in the T3E Multiprocessor
This paper describes the synchronization and communication primitives of the Cray T3E multiprocessor, a shared memory system scalable to 2048 processors. We discuss what we have l...
Steven L. Scott