Sciweavers

15635 search results - page 2912 / 3127
» A Designing Model of XML-Dataweb
Sort
View
IROS
2006
IEEE
132views Robotics» more  IROS 2006»
15 years 9 months ago
3D interaction technique to enhance telemanipulation tasks using virtual environment
Abstract— This paper gives preliminary results about the utilization of an interaction technique called FOLLOW-ME to fasten the selection task for teleoperation system. The imple...
Nassima Ouramdane-Djerrah, Frédéric ...
TRIDENTCOM
2006
IEEE
15 years 9 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
160
Voted
ACMICEC
2006
ACM
142views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings
In electronic marketplaces populated by self-interested agents, buyer agents would benefit by modeling the reputation of seller agents, in order to make effective decisions abou...
Jie Zhang, Robin Cohen
138
Voted
AOSD
2006
ACM
15 years 9 months ago
Using aspects to support the software process: XP over Eclipse
Usually, aspects enhance a software product by being composed - or woven - into it. Here, on the other hand, we use aspects to support the software development process itself. The...
Oren Mishali, Shmuel Katz
139
Voted
IMC
2006
ACM
15 years 9 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
« Prev « First page 2912 / 3127 Last » Next »