Sciweavers

1683 search results - page 139 / 337
» A Needed Narrowing Strategy
Sort
View
110
Voted
CCS
2003
ACM
15 years 9 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
CSCW
2011
ACM
14 years 11 months ago
Your time zone or mine?: a study of globally time zone-shifted collaboration
We conducted interviews with sixteen members of teams that worked across global time zone differences. Despite time zone differences of about eight hours, collaborators still foun...
John C. Tang, Chen Zhao, Xiang Cao, Kori Inkpen
DAGSTUHL
2007
15 years 5 months ago
End-User Development Techniques for Enterprise Resource Planning Software Systems
Abstract. The intent of this position paper is to present the focus of interest of our end-user development (EUD) related research at SAP Research CEC Darmstadt, enabling other par...
Michael Spahn, Stefan Scheidl, Todor Stoitsev
ICIP
2001
IEEE
16 years 5 months ago
Morphological scale-space analysis and feature extraction
This paper presents a morphological scale-space approach to the problem of feature extraction. The method relies on two steps: a hierarchical simplification step based on pyramids...
Corinne Vachier
ICDE
2006
IEEE
177views Database» more  ICDE 2006»
16 years 5 months ago
Closest-Point-of-Approach Join for Moving Object Histories
In applications that produce a large amount of data describing the paths of moving objects, there is a need to ask questions about the interaction of objects over a long recorded ...
Subramanian Arumugam, Chris Jermaine