Sciweavers

284 search results - page 47 / 57
» Facility Location
Sort
View
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
ISM
2006
IEEE
86views Multimedia» more  ISM 2006»
14 years 1 months ago
OreDesk: A Tool for Retrieving Data History Based on User Operations
During day-to-day activities, a user refers to various data items on a PC, such as documents, images, and audio clips. However, when the number of items in the history increases, ...
Ryo Ohsawa, Kazunori Takashio, Hideyuki Tokuda
SIGCSE
2005
ACM
156views Education» more  SIGCSE 2005»
14 years 1 months ago
Experiences teaching operating systems using virtual platforms and linux
Operating system courses teach students much more when they provide hands-on kernel-level project experience with a real operating system. However, enabling a large class of stude...
Jason Nieh, Chris Vaill
MHCI
2005
Springer
14 years 1 months ago
Rolling, rotating and imagining in a virtual mobile world
New mobile devices can be difficult to use because they give users access to powerful computing devices through small interfaces, which typically have limited input facilities. On...
Lynne Baillie, Harald Kunczier, Hermann Anegg
OTM
2005
Springer
14 years 1 months ago
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
In our current connected wireless world, mobile devices are enabled to use various networking facilities. Although this enables mobile users to communicate any time and any place, ...
Katarzyna Wac