Sciweavers

10263 search results - page 1957 / 2053
» From Use Cases to System Operation Specifications
Sort
View
ISSRE
2010
IEEE
13 years 7 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
AIEDU
2010
13 years 3 months ago
Scaffolding Meta-Cognitive Skills for Effective Analogical Problem Solving via Tailored Example Selection
Although worked-out examples play a key role in cognitive skill acquisition, research demonstrates that students have various levels of meta-cognitive abilities for using examples ...
Kasia Muldner, Cristina Conati
SIGMETRICS
1996
ACM
122views Hardware» more  SIGMETRICS 1996»
14 years 1 months ago
Experiments with Digital Video Playback
In this paper we describe our experiments on digital video applications, concentrating on the static and dynamic tradeo s involved in video playback. Our results were extracted fr...
Richard Gerber, Ladan Gharai
MKWI
2008
135views Business» more  MKWI 2008»
13 years 10 months ago
Ontology-based process mediation in the European project BRITE
: Service-oriented architectures (SOA) are recent architectures enabling interoperable machine-to-machine process interaction by generating a comprehensive view of independent soft...
Ansgar Mondorf, Timo Herborn
CN
2007
137views more  CN 2007»
13 years 8 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
« Prev « First page 1957 / 2053 Last » Next »