Sciweavers

6300 search results - page 184 / 1260
» We have it easy, but do we have it right
Sort
View
BCS
2008
15 years 3 months ago
Distributed Defence Against Denial of Service Attacks: A Practical View
In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effect...
Gülay Öke, Georgios Loukas
93
Voted
LREC
2010
200views Education» more  LREC 2010»
15 years 3 months ago
A Corpus Factory for Many Languages
For many languages there are no large, general-language corpora available. Until the web, all but the richest institutions could do little but shake their heads in dismay as corpu...
Adam Kilgarriff, Siva Reddy, Jan Pomikálek,...
ENTCS
2008
110views more  ENTCS 2008»
15 years 1 months ago
Modelling Devices for Natural Interaction
We do not interact with systems without first performing some physical action on a physical device. This paper shows how formal notations and formal models can be developed to acc...
Alan J. Dix, Masitah Ghazali, Devina Ramduny-Ellis
ISSAC
2005
Springer
101views Mathematics» more  ISSAC 2005»
15 years 7 months ago
Adherence is better than adjacency: computing the Riemann index using CAD
Given an elementary function with algebraic branch cuts, we show how to decide which sheet of the associated Riemann surface we are on at any given point. We do this by establishi...
James C. Beaumont, Russell J. Bradford, James H. D...
ISSS
1996
IEEE
87views Hardware» more  ISSS 1996»
15 years 5 months ago
Breakpoints and Breakpoint Detection in Source Level Emulation
In this paper we discuss, what breakpoints in Source Level Emulationa are, how we can work with them and how we have to change the cicuit generated by high level synthesis to do s...
Gernot Koch, Udo Kebschull, Wolfgang Rosenstiel