Sciweavers

42738 search results - page 8286 / 8548
» Search Computing Systems
Sort
View
150
Voted
SIGCSE
2005
ACM
163views Education» more  SIGCSE 2005»
15 years 9 months ago
Using SeSFJava in teaching introductory network courses
Networking course projects are usually described by an informal specification and a collection of test cases. Students often misunderstand the specification or oversimplify it t...
Tamer Elsharnouby, A. Udaya Shankar
132
Voted
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
15 years 9 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
173
Voted
WS
2005
ACM
15 years 9 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
109
Voted
BIRTHDAY
2005
Springer
15 years 9 months ago
Still
Keywords Name of the disease and synonyms Definition/Diagnostic criteria Juvenile form Comments on the differential diagnosis Incidence Clinical description Method of biological d...
Alice ter Meulen
298
Voted
CASSIS
2005
Springer
15 years 9 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
« Prev « First page 8286 / 8548 Last » Next »