Sciweavers

524 search results - page 64 / 105
» Why phishing works
Sort
View
GLOBECOM
2008
IEEE
15 years 6 months ago
On Traffic Long-Range Dependence at the Output of Schedulers with Multiple Service Classes
 Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely impacts network performance yielding longer queuing delays. Moreover, LRD is almos...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
IEEEIAS
2008
IEEE
15 years 6 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
IPPS
2007
IEEE
15 years 6 months ago
A Survey of Worst-Case Execution Time Analysis for Real-Time Java
As real-time systems become more prevalent, there is a need to guarantee that these increasingly complex systems perform as designed. One technique involves a static analysis to p...
Trevor Harmon, Raymond Klefstad
IV
2007
IEEE
139views Visualization» more  IV 2007»
15 years 6 months ago
Investigating perceptual responses and shared understanding of architectural design ideas when communicated through different fo
Research to date has demonstrated the apparent differences how architects, as ‘experts’ and members of the public as ‘non-experts’ perceive and understand visual represent...
Nada Bates-Brkljac
ACII
2007
Springer
15 years 6 months ago
Expression of Emotions in Virtual Humans Using Lights, Shadows, Composition and Filters
Abstract. Artists use words, lines, shapes, color, sound and their bodies to express emotions. Virtual humans use postures, gestures, face and voice to express emotions. Why are th...
Celso de Melo, Ana Paiva