Sciweavers

2179 search results - page 308 / 436
» Symmetry within Solutions
Sort
View
CMS
2001
119views Communications» more  CMS 2001»
15 years 2 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
DOA
2001
94views more  DOA 2001»
15 years 2 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
97
Voted
ECSCW
2001
15 years 2 months ago
Reducing interference in single display groupware through transparency
Single Display Groupware (SDG) supports face-to-face collaborators working over a single shared display, where all people have their own input device Although SDG is simple in conc...
Ana Zanella, Saul Greenberg
IFIP11
2004
114views Business» more  IFIP11 2004»
15 years 2 months ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
NIPS
2004
15 years 2 months ago
A Topographic Support Vector Machine: Classification Using Local Label Configurations
The standard approach to the classification of objects is to consider the examples as independent and identically distributed (iid). In many real world settings, however, this ass...
Johannes Mohr, Klaus Obermayer