Sciweavers

13489 search results - page 2661 / 2698
» Operating System
Sort
View
121
Voted
ATAL
2008
Springer
15 years 4 months ago
Simulating human behaviors in agent societies
As increasing numbers of processors and agents pervade the human environment, societies comprising both humans and agents will emerge. Presently, it is unknown how a person might ...
Alicia Ruvinsky, Michael N. Huhns
118
Voted
CCS
2008
ACM
15 years 4 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
CIKM
2008
Springer
15 years 4 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho
CANDC
2005
ACM
15 years 4 months ago
Computational schemes for biomimetic sculpture
A prototype system for the automatic evolution of biomimetic structures using structural automata is described and its utility for generating digital sculpture is demonstrated. Sc...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...
146
Voted
ICDCS
2010
IEEE
15 years 4 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
« Prev « First page 2661 / 2698 Last » Next »