: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
This paper provides the documented explanations of our submitted poster to CHI 2003 about the process of Information Architecture (IA). The general theme of CHI 2003 was to delive...
Many wireless standards and protocols today, such as WLAN and Bluetooth, operate on similar frequency bands. While this permits an efficient usage of the limited medium capacity, ...
Dominic Meier, Yvonne Anne Pignolet, Stefan Schmid...
Extraction-Transformation-Loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization and insertion into ...
This study examines the publically available stories of selfidentified successful couples that met using the online dating services Match.com, eHarmony, or OkCupid. We enumerate f...
Christopher M. Mascaro, Rachel M. Magee, Sean P. G...