Sciweavers

266 search results - page 36 / 54
» General Homomorphic Overloading
Sort
View
ACMSE
2006
ACM
14 years 1 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
ECLIPSE
2006
ACM
14 years 1 months ago
A focused learning environment for Eclipse
The support available in Eclipse to help software developers learn complex APIs and development tools is inadequate; the support is largely passive and the support typically opera...
Izzet Safer, Gail C. Murphy, Julie Waterhouse, Jin...
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
WIDM
2005
ACM
14 years 27 days ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
CALCO
2005
Springer
109views Mathematics» more  CALCO 2005»
14 years 26 days ago
Final Semantics for Event-Pattern Reactive Programs
Event-pattern reactive programs are front-end programs for distributed reactive components that preprocess an incoming stream of event stimuli. Their purpose is to recognize tempor...
César Sánchez, Henny B. Sipma, Matte...