Sciweavers

7416 search results - page 1363 / 1484
» Design of an Anatomy Information System
Sort
View
CN
2007
137views more  CN 2007»
13 years 8 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
CORR
2007
Springer
75views Education» more  CORR 2007»
13 years 8 months ago
Outage Behavior of Discrete Memoryless Channels Under Channel Estimation Errors
Classically, communication systems are designed assuming perfect channel state information at the receiver and/or transmitter. However, in many practical situations, only an estim...
Pablo Piantanida, Gerald Matz, Pierre Duhamel
JUCS
2008
163views more  JUCS 2008»
13 years 8 months ago
Authoring Social-aware Tasks on Active Spaces
: Social-aware computing is an emerging trend based on ubiquitous computing technologies and collaborative work. A successful design demands a better understanding of group tasks, ...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
JUCS
2008
172views more  JUCS 2008»
13 years 8 months ago
Formal Action Semantics for a UML Action Language
Abstract: The abstract syntax and static semantics of UML, the widely-used generalpurpose graphical modeling language, have been standardized in a four-layer metamodeling framework...
Mikai Yang, Greg J. Michaelson, Rob Pooley
JMM2
2006
126views more  JMM2 2006»
13 years 8 months ago
Modeling Augmented Reality User Interfaces with SSIML/AR
Augmented Reality (AR) technologies open up new possibilities especially for task-focused domains such as assembly and maintenance. However, it can be noticed that there is still a...
Arnd Vitzthum, Heinrich Hussmann
« Prev « First page 1363 / 1484 Last » Next »