Sciweavers

838 search results - page 119 / 168
» Admission control in Peer-to-Peer: design and performance ev...
Sort
View
SOCA
2007
IEEE
14 years 2 months ago
Creating Web Services From GUI-Based Applications
— Graphical User Interface (GUI) APplications (GAPs) are ubiquitous and provide various services. However, it is difficult to make GAPs exchange information (i.e., interoperate)...
Mark Grechanik, Kevin M. Conroy, Kishore S. Swamin...
ICMI
2007
Springer
115views Biometrics» more  ICMI 2007»
14 years 1 months ago
Voicepen: augmenting pen input with simultaneous non-linguisitic vocalization
This paper explores using non-linguistic vocalization as an additional modality to augment digital pen input on a tablet computer. We investigated this through a set of novel inte...
Susumu Harada, T. Scott Saponas, James A. Landay
ECRTS
2006
IEEE
14 years 1 months ago
Optimal deadline assignment for periodic real-time tasks in dynamic priority systems
Real-time systems are often designed using a set of periodic tasks. Task periods are usually set by the system requirements, but deadlines and computation times can be modified i...
Patricia Balbastre, Ismael Ripoll, Alfons Crespo
ALGOSENSORS
2004
Springer
14 years 1 months ago
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC is a medium access control protocol designed for wireless sensor networks. This protocol is based on non-persistent CSMA and uses the preamble sampling technique to minimiz...
Amre El-Hoiydi, Jean-Dominique Decotignie
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
13 years 12 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...