Sciweavers

2912 search results - page 540 / 583
» Overlay Networks - Implementation by Specification
Sort
View
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 8 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
IUI
2003
ACM
15 years 8 months ago
Lessons learned in modeling schizophrenic and depressed responsive virtual humans for training
This paper describes lessons learned in developing the linguistic, cognitive, emotional, and gestural models underlying virtual human behavior in a training application designed t...
Robert C. Hubal, Geoffrey A. Frank, Curry I. Guinn
149
Voted
CCS
2003
ACM
15 years 8 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
160
Voted
AINA
2010
IEEE
15 years 8 months ago
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...
INFOCOM
2002
IEEE
15 years 8 months ago
Increase-Decrease Congestion Control for Real-time Streaming: Scalability
– Typically, NACK-based congestion control is dismissed as being not viable due to the common notion that “open-loop” congestion control is simply “difficult.” Emerging r...
Dmitri Loguinov, Hayder Radha