Sciweavers

12336 search results - page 2420 / 2468
» Active Information Retrieval
Sort
View
CIT
2004
Springer
14 years 3 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
GI
2004
Springer
14 years 3 months ago
Towards Using the Full Human Potential in Games and Virtual Environments
: Humans have complex sensory and control capabilities. Only a few are used in standard games and virtual environments. Examples of games using interfaces beyond mouse, keyboard an...
Steffi Beckhaus
ICCS
2004
Springer
14 years 3 months ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan
ISW
2004
Springer
14 years 3 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
LSGRID
2004
Springer
14 years 3 months ago
Grid Portal Interface for Interactive Use and Monitoring of High-Throughput Proteome Annotation
High-throughput proteome annotation refers to the activity of extracting information from all proteins in a particular organism using bioinformatics software on a high performance ...
Atif Shahab, Danny Chuon, Toyotaro Suzumura, Wilfr...
« Prev « First page 2420 / 2468 Last » Next »