Sciweavers

1352 search results - page 114 / 271
» Designing Security Requirements Models Through Planning
Sort
View
129
Voted
CCS
2008
ACM
15 years 5 months ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang
112
Voted
ICTAI
2008
IEEE
15 years 10 months ago
GeoDialogue: A Software Agent Enabling Collaborative Dialogues between a User and a Conversational GIS
A fundamental challenge that must be met to achieve a usable conversational interface to Geographic Information System (GIS) is how to enable a more natural interaction between th...
Hongmei Wang, Guoray Cai, Alan M. MacEachren
110
Voted
IPPS
1998
IEEE
15 years 7 months ago
High-Performance External Computations Using User-Controllable I/O
The UPIO (User-controllable Parallel I/O) we proposed xtends the abstraction of a linear file model into an n-dimensional file model, making it possible to control the layout of d...
Jang Sun Lee, Sung Hoon Ko, Sanjay Ranka, Byung Eu...
135
Voted
CAD
2002
Springer
15 years 3 months ago
Free-form design using axial curve-pairs
Deformation of 3D shapes usually requires the use of a deformation tool. The freeform deformation technique requires the use of a lattice of control point for deforming an object....
K. C. Hui
OOPSLA
2007
Springer
15 years 9 months ago
SmartEMF: guidance in modeling tools
The advent of domain-specific modeling in enterprise systems development has given rise to new tool requirements. Existing tools do not offer sufficient modeling guidance or inc...
Anders Hessellund