Sciweavers

1636 search results - page 141 / 328
» From Usability Lab to
Sort
View
ICPPW
2006
IEEE
14 years 4 months ago
A First Look at the Properties of Many-to-One Data Flows
With the rapid emergence of peer-to-peer applications, more and more applications will generate many-to-one rather than one-to-one traffic flows. While a number of previous works ...
V. T. Sam, P. Y. Ho, Jack Y. B. Lee
IEEEARES
2006
IEEE
14 years 4 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
INFOSECCD
2006
ACM
14 years 4 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
CCGRID
2005
IEEE
14 years 4 months ago
Logistical multicast for data distribution
This paper describes a simple scheduling procedure for use in multicast data distribution within a logistical networking infrastructure. The goal of our scheduler is to generate a...
Jason Zurawski, D. Martin Swany, Micah Beck, Ying ...
CIG
2005
IEEE
14 years 4 months ago
Pared-down Poker: Cutting to the Core of Command and Control
Poker poses cognitive challenges like those of warfare, business and other real world domains. This makes poker a good test bed for basic research on how people make Command and Co...
Kevin Burns