Sciweavers

1663 search results - page 265 / 333
» Computer Security in the Real World
Sort
View
CIA
2008
Springer
15 years 5 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
ATAL
2006
Springer
15 years 5 months ago
Evaluating bidding strategies for simultaneous auctions
Bidding for multiple items or bundles on online auctions raises challenging problems. We assume that an agent has a valuation function that returns its valuation for an arbitrary ...
Teddy Candale, Sandip Sen
CSCW
2008
ACM
15 years 5 months ago
Can markets help?: applying market mechanisms to improve synchronous communication
There is a growing interest in applying market mechanisms to tackle everyday communication problems such as communication interruptions and communication overload. Prior analytic ...
Gary Hsieh, Robert Kraut, Scott E. Hudson, Roberto...
APPINF
2003
15 years 5 months ago
Hardware Impact on Communication Performance of Beowulf LINUX Cluster
There exist a lot of models of parallel computation, amongst which LogP and LogGP are famous and suitable to describe the framework of communication process of Beowulf LINUX Clust...
Yuan Tang, Yun-Quan Zhang, Jia-Chang Sun, Yu-Cheng...
GRAPHICSINTERFACE
2001
15 years 5 months ago
Corrosion: Simulating and Rendering
Weathering phenomena represent a topic of growing interest in computer graphics, and corrosion reactions are of great importance since they affect a large number of different fiel...
Stéphane Mérillou, Jean-Michel Disch...