Sciweavers

499 search results - page 96 / 100
» chi 2006
Sort
View
JSS
2002
90views more  JSS 2002»
14 years 10 months ago
Visual requirement representation
Most software development errors are caused by incorrect or ambiguous requirement specifications gathered during the requirement elicitation and analysis phase. For the past decad...
Deng-Jyi Chen, Wu-Chi Chen, Krishna M. Kavi
JSAC
2006
93views more  JSAC 2006»
14 years 10 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
IJNSEC
2007
193views more  IJNSEC 2007»
14 years 10 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
INTERACTIONS
2010
97views more  INTERACTIONS 2010»
14 years 8 months ago
Design challenge based learning (DCBL) and sustainable pedagogical practice
s on Human Factors in Computing Systems. CHI ‘07. New York: ACM, 2007. university environment at scale, with structure, and with rigor. The notion of studio culture and learning ...
Eli Blevis
BMCBI
2006
107views more  BMCBI 2006»
14 years 10 months ago
A reinforced merging methodology for mapping unique peptide motifs in members of protein families
Background: Members of a protein family often have highly conserved sequences; most of these sequences carry identical biological functions and possess similar three-dimensional (...
Hao-Teng Chang, Tun-Wen Pai, Tan-Chi Fan, Bo-Han S...