Sciweavers

2108 search results - page 367 / 422
» An Information Model for Nomadic Environments
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
13 years 7 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
ENTCS
2006
109views more  ENTCS 2006»
13 years 7 months ago
Incremental Verification for On-the-Fly Controller Synthesis
The CIRCA system automatically synthesizes hard real-time discrete event controllers from plant and environment descriptions. CIRCA's automatically-synthesized controllers pr...
David J. Musliner, Michael J. S. Pelican, Robert P...
CN
2007
80views more  CN 2007»
13 years 7 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
JSW
2008
95views more  JSW 2008»
13 years 7 months ago
From Sensors to Assisted Driving - Bridging the Gap
Increasing traffic density enforces development of Advanced Driver Assistance Systems to cope with safety aspects. Such systems require serious amount of sensor data to deduce spat...
Marcus Tönnis, Jan-Gregor Fischer, Gudrun Kli...
SIGCSE
2008
ACM
141views Education» more  SIGCSE 2008»
13 years 7 months ago
Broadening participation through scalable game design
Game development is quickly gaining popularity in introductory programming courses. Motivational and educational aspects of game development are hard to balance and often sacrific...
Alexander Repenning, Andri Ioannidou