Sciweavers

35419 search results - page 45 / 7084
» How are we doing
Sort
View
CCS
2003
ACM
14 years 1 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
DELFI
2006
13 years 10 months ago
Mobile Learning is Coming of Age - What we have and what we still miss
: Mobile learning has left the status of a new born child. It is time now to implement some structure into the complex and various activities by a framework presented in this paper...
Dirk Frohberg
WCRE
2007
IEEE
14 years 2 months ago
Do Code and Comments Co-Evolve? On the Relation between Source Code and Comment Changes
Comments are valuable especially for program understanding and maintenance, but do developers comment their code? To which extent do they add comments or adapt them when they evol...
Beat Fluri, Michael Würsch, Harald Gall
WDAG
2001
Springer
131views Algorithms» more  WDAG 2001»
14 years 28 days ago
The Complexity of Synchronous Iterative Do-All with Crashes
Abstract. The ability to cooperate on common tasks in a distributed setting is key to solving a broad range of computation problems ranging from distributed search such as SETI to ...
Chryssis Georgiou, Alexander Russell, Alexander A....
JASIS
2008
117views more  JASIS 2008»
13 years 8 months ago
Blind men and elephants: What do citation summaries tell us about a research article?
The old Asian legend about the blind men and the elephant comes to mind when looking at how different authors of scientific papers describe a piece of related prior work. It turns...
Aaron Elkiss, Siwei Shen, Anthony Fader, Güne...