Sciweavers

3155 search results - page 63 / 631
» How Are You Doing
Sort
View
CORR
2006
Springer
77views Education» more  CORR 2006»
13 years 7 months ago
Deductive Object Programming
We propose some slight additions to O-O languages to implement the necessary features for using Deductive Object Programming (DOP). This way of programming based upon the manipula...
François Colonna
GLOBECOM
2006
IEEE
14 years 1 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
ICC
2009
IEEE
122views Communications» more  ICC 2009»
14 years 2 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
CHI
2002
ACM
14 years 8 months ago
"I'd be overwhelmed, but it's just one more thing to do": availability and interruption in research management
Many CSCW projects dealing with individual availability and interruption filtering achieve only limited success. Perhaps this is because designers of such systems have limited evi...
James M. Hudson, Jim Christensen, Wendy A. Kellogg...
SIGSOFT
2010
ACM
13 years 6 months ago
Why do we need personality diversity in software engineering?
Diversity of skills is good for society, it is also good in problem solving because different people see a problem from several perspectives, so diversity should be good for softw...
Luiz Fernando Capretz, Faheem Ahmed