Sciweavers

9588 search results - page 1600 / 1918
» Service Value Networks
Sort
View
IJSN
2007
82views more  IJSN 2007»
15 years 4 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
IJVR
2007
101views more  IJVR 2007»
15 years 4 months ago
Playful Geospatial Data Acquisition by Location-based Gaming Communities
—The success of Web 2.0 communities demonstrates that the users of an information service are willing to participate in the content creation process on a voluntary basis. In this...
Sebastian Matyas
IOR
2007
82views more  IOR 2007»
15 years 4 months ago
Compensating for Failures with Flexible Servers
We consider the problem of maximizing capacity in a queueing network with flexible servers, where the classes and servers are subject to failure. We assume that the interarrival ...
Sigrún Andradóttir, Hayriye Ayhan, D...
BEHAVIOURIT
2005
79views more  BEHAVIOURIT 2005»
15 years 4 months ago
Usage and user experience of communication before and during rendezvous
This paper reports a field evaluation of the mobile phone as a `package' of device and services. The evaluation compares 44 university students' usage and user experienc...
Martin Colbert
AC
2004
Springer
15 years 4 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
« Prev « First page 1600 / 1918 Last » Next »