Sciweavers

15635 search results - page 2912 / 3127
» A Designing Model of XML-Dataweb
Sort
View
IROS
2006
IEEE
132views Robotics» more  IROS 2006»
14 years 3 months ago
3D interaction technique to enhance telemanipulation tasks using virtual environment
Abstract— This paper gives preliminary results about the utilization of an interaction technique called FOLLOW-ME to fasten the selection task for teleoperation system. The imple...
Nassima Ouramdane-Djerrah, Frédéric ...
TRIDENTCOM
2006
IEEE
14 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
ACMICEC
2006
ACM
142views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings
In electronic marketplaces populated by self-interested agents, buyer agents would benefit by modeling the reputation of seller agents, in order to make effective decisions abou...
Jie Zhang, Robin Cohen
AOSD
2006
ACM
14 years 3 months ago
Using aspects to support the software process: XP over Eclipse
Usually, aspects enhance a software product by being composed - or woven - into it. Here, on the other hand, we use aspects to support the software development process itself. The...
Oren Mishali, Shmuel Katz
IMC
2006
ACM
14 years 3 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
« Prev « First page 2912 / 3127 Last » Next »