Sciweavers

1005 search results - page 64 / 201
» Can machines call people
Sort
View
RAID
2007
Springer
14 years 4 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
WWW
2007
ACM
14 years 11 months ago
Geotracker: geospatial and temporal RSS navigation
The Web is rapidly moving towards a platform for mass collaboration in content production and consumption. Fresh content on a variety of topics, people, and places is being create...
Yih-Farn Robin Chen, Giuseppe Di Fabbrizio, David ...
ICFP
2009
ACM
14 years 11 months ago
Partial memoization of concurrency and communication
Memoization is a well-known optimization technique used to eliminate redundant calls for pure functions. If a call to a function f with argument v yields result r, a subsequent ca...
Lukasz Ziarek, K. C. Sivaramakrishnan, Suresh Jaga...
AINA
2004
IEEE
14 years 2 months ago
Performance Improvement for GPRS, WLAN Integration using Ad Hoc Networks
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
Jui-Ming Chen, Li-Der Chou
WSC
1998
13 years 11 months ago
Developing a Graphical User Interface for Discrete Event Simulation
A key concern for the area of discrete event simulation modelling is to encourage its adoption and use by nonspecialists. To achieve this it is important that we focus on developi...
Hamad I. Odhabi, Ray J. Paul, Robert D. Macredie