Sciweavers

5577 search results - page 1031 / 1116
» E2K Technology and Implementation
Sort
View
144
Voted
RAID
2009
Springer
15 years 10 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
ACMACE
2009
ACM
15 years 10 months ago
iSee: interactive scenario explorer for online tournament games
Fantasy games, in which players compete to correctly predict realworld outcomes in sports, entertainment, and politics, have grown in popularity and now represent a significant po...
Greg Smith, Desney S. Tan, Bongshin Lee
AUTOMOTIVEUI
2009
ACM
15 years 10 months ago
Enhanced turning point displays facilitate drivers' interaction with navigation devices
Recently, the use of in-vehicle navigation devices, such as PNDs (Personal or Portable Navigation Devices) has become pervasive, and the device functions have been rapidly expande...
Myounghoon Jeon, Junho Park, Ubeom Heo, Jongmin Yu...
EICS
2009
ACM
15 years 10 months ago
Edit, inspect and connect your surroundings: a reference framework for meta-UIs
Discovering and unlocking the full potential of complex pervasive environments is still approached in application-centric ways. A set of statically deployed applications often deļ...
Geert Vanderhulst, Daniel Schreiber, Kris Luyten, ...
185
Voted
INFOSCALE
2009
ACM
15 years 10 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
« Prev « First page 1031 / 1116 Last » Next »