Sciweavers

1033 search results - page 190 / 207
» Software Quality in the Objectory Process
Sort
View
LCN
2005
IEEE
15 years 9 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
EMSOFT
2005
Springer
15 years 9 months ago
Using de-optimization to re-optimize code
The nature of embedded systems development places a great deal of importance on meeting strict requirements in areas such as static code size, power consumption, and execution tim...
Stephen Hines, Prasad Kulkarni, David B. Whalley, ...
IDEAL
2005
Springer
15 years 9 months ago
Patterns in Complex Systems Modeling
The design, development, and use of complex systems models raises a unique class of challenges and potential pitfalls, many of which are commonly recurring problems. Over time, res...
Janet Wiles, James Watson
SIGIR
2004
ACM
15 years 9 months ago
Forming test collections with no system pooling
Forming test collection relevance judgments from the pooled output of multiple retrieval systems has become the standard process for creating resources such as the TREC, CLEF, and...
Mark Sanderson, Hideo Joho
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
15 years 9 months ago
Automated Coaching of Collaboration Based on Workspace Analysis: Evaluation and Implications for Future Learning Environments
This paper describes the design and evaluation of COLER, a computer mediated learning environment that includes a software coach to help students collaborate while solving Entity ...
María de los Angeles Constantino-Gonz&aacut...