Sciweavers

3013 search results - page 560 / 603
» HCI for the real world
Sort
View
NOSSDAV
2010
Springer
14 years 1 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
BTW
2009
Springer
132views Database» more  BTW 2009»
14 years 1 months ago
A Bayesian Approach to Estimating the Selectivity of Conjunctive Predicates
: Cost-based optimizers in relational databases make use of data statistics to estimate intermediate result cardinalities. Those cardinalities are needed to estimate access plan co...
M. Heimel, Volker Markl, Keshava Murthy
DESRIST
2009
Springer
110views Education» more  DESRIST 2009»
14 years 1 months ago
Towards a paradigmatic shift in IS: designing for social practice
The paper elaborates on the theoretical foundation of Information System understood as a field of design science. Revisiting Hevner’s et al. seminal paper [44], we elaborate on ...
Markus Rohde, Gunnar Stevens, Peter Brödner, ...
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
14 years 1 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi
HPCC
2009
Springer
14 years 1 months ago
On Instruction-Level Method for Reducing Cache Penalties in Embedded VLIW Processors
Usual cache optimisation techniques for high performance computing are difficult to apply in embedded VLIW applications. First, embedded applications are not always well structur...
Samir Ammenouche, Sid Ahmed Ali Touati, William Ja...