Sciweavers

7383 search results - page 1450 / 1477
» Theories of information behavior
Sort
View
ICMENS
2003
IEEE
153views Hardware» more  ICMENS 2003»
15 years 3 months ago
Biologically Inspired Intelligent Robots Using Artificial Muscles
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. This field of b...
Yoseph Bar-Cohen
ICNP
2003
IEEE
15 years 3 months ago
The Temporal and Topological Characteristics of BGP Path Changes
BGP has been deployed in Internet for more than a decade. However, the events that cause BGP topological changes are not well understood. Although large traces of routing updates ...
Di-Fa Chang, Ramesh Govindan, John S. Heidemann
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
15 years 3 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
15 years 3 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 3 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
« Prev « First page 1450 / 1477 Last » Next »