Sciweavers

450 search results - page 61 / 90
» Games with Exhaustible Resources
Sort
View
TSE
2010
155views more  TSE 2010»
13 years 6 months ago
A Comparison of Six UML-Based Languages for Software Process Modeling
— Describing and managing activities, resources and constraints of software development processes is a challenging goal for many organizations. A first generation of Software Pro...
Reda Bendraou, Jean-Marc Jézéquel, M...
ECTEL
2009
Springer
13 years 5 months ago
Using Third Party Services to Adapt Learning Material: A Case Study with Google Forms
Abstract. Current Learning Management Systems were typically conceived to offer a self-contained "one size fits all" learning environment. Adaptive educational systems ha...
Luis de la Fuente Valentín, Abelardo Pardo,...
NAR
2011
244views Computer Vision» more  NAR 2011»
13 years 2 months ago
PROMISCUOUS: a database for network-based drug-repositioning
The procedure of drug approval is time-consuming, costly and risky. Accidental findings regarding multispecificity of approved drugs led to block-busters in new indication areas. ...
Joachim von Eichborn, Manuela S. Murgueitio, Mathi...
JDCTA
2010
143views more  JDCTA 2010»
13 years 2 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
JDCTA
2010
139views more  JDCTA 2010»
13 years 2 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh