Sciweavers

35419 search results - page 32 / 7084
» How Are We Doing
Sort
View
TLT
2008
93views more  TLT 2008»
13 years 7 months ago
What Do You Prefer? Using Preferences to Enhance Learning Technology
While the growing number of learning resources increases the choice for learners on how, what and when to learn, it also makes it more and more difficult to find the learning resou...
Philipp Kärger, Daniel Olmedilla, Fabian Abel...
ESORICS
2009
Springer
14 years 8 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
ICWSM
2010
13 years 8 months ago
Why do Users Tag? Detecting Users' Motivation for Tagging in Social Tagging Systems
While recent progress has been achieved in understanding the structure and dynamics of social tagging systems, we know little about the underlying user motivations for tagging, an...
Markus Strohmaier, Christian Körner, Roman Ke...
CHI
2005
ACM
14 years 7 months ago
When participants do the capturing: the role of media in diary studies
In this paper, we investigate how the choice of media for capture and access affects the diary study method. The diary study is a method of understanding participant behavior and ...
Scott Carter, Jennifer Mankoff
GLOBECOM
2006
IEEE
14 years 1 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...