Sciweavers

132 search results - page 14 / 27
» An empirical evaluation of undo mechanisms
Sort
View
EUROPAR
2007
Springer
14 years 2 months ago
Characterizing Result Errors in Internet Desktop Grids
Abstract. Desktop grids use the free resources in Intranet and Internet environments for large-scale computation and storage. While desktop grids offer a high return on investment...
Derrick Kondo, Filipe Araujo, Paul Malecot, Patr&i...
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 8 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
JCST
2008
144views more  JCST 2008»
13 years 8 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...
CHI
2004
ACM
14 years 8 months ago
Release, relocate, reorient, resize: fluid techniques for document sharing on multi-user interactive tables
Group work frequently involves transitions between periods of active collaboration and periods of individual activity. We aim to support this typical work practice by introducing ...
Chia Shen, Clifton Forlines, Frédéri...
ICSM
2009
IEEE
14 years 3 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...