Sciweavers

1079 search results - page 191 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
CONEXT
2008
ACM
13 years 9 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
ISTA
2008
13 years 9 months ago
Towards Truly Flexible and Adaptive Process-Aware Information Systems
If current process management systems shall be applied to a broad spectrum of applications, they will have to be significantly improved with respect to their technological capabili...
Peter Dadam, Manfred Reichert, Stefanie Rinderle, ...
BIS
2006
122views Business» more  BIS 2006»
13 years 9 months ago
Variability Mechanisms in E-Business Process Families
Abstract Nowadays, process oriented software systems, like many business information systems, don't exist only in one single version, but in many variants for better coverage ...
Arnd Schnieders, Frank Puhlmann
ALIFE
2007
13 years 8 months ago
Life Cycle of a Minimal Protocell - A Dissipative Particle Dynamics Study
Cross-reactions and other systematic difficulties generated by the coupling of functional chemical subsystems pose the largest challenge for assembling a viable protocell in the la...
Harold Fellermann, Steen Rasmussen, Hans-Joachim Z...
MAGS
2008
122views more  MAGS 2008»
13 years 7 months ago
Integrating embodied conversational agent components with a generic framework
Embodied Conversational Agents (ECAs) are computer generated life-like characters that interact with human users in face-to-face conversations. To achieve natural multi-modal conve...
Hung-Hsuan Huang, Aleksandra Cerekovic, Kateryna T...