Sciweavers

10263 search results - page 1912 / 2053
» From Use Cases to System Operation Specifications
Sort
View
CHI
1995
ACM
14 years 16 days ago
Applying Electric Field Sensing to Human-Computer Interfaces
A non-contact sensor based on the interaction of a person with electric fields for human-computer interface is investigated. Two sensing modes are explored: an external electric f...
Thomas G. Zimmerman, Joshua R. Smith, Joseph A. Pa...
IMECS
2007
13 years 10 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
MASCOTS
2004
13 years 10 months ago
Predicting When Not to Predict
File prefetching based on previous file access patterns has been shown to be an effective means of reducing file system latency by implicitly loading caches with files that are li...
Karl Brandt, Darrell D. E. Long, Ahmed Amer
WORM
2004
13 years 10 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
ISPE
2003
13 years 10 months ago
Coordination in utility managed multi-agent groups
A two stage approach to co-ordination in a multi-agent society is presented. The first stage involves agents learning to co-ordinate their activities based on local and global uti...
Fernanda Barbosa, José C. Cunha, Omer F. Ra...
« Prev « First page 1912 / 2053 Last » Next »