Sciweavers

1418 search results - page 53 / 284
» How to Explain Mistakes
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Steven M. Bellovin, Eric Rescorla
NORDICHI
2006
ACM
14 years 3 months ago
Exploring the space of near-future design with children
This paper describes a series of user-centred design sessions conducted with children of varying ages to explore near-future applications of sensor-based technologies. We explain ...
Mark Stringer, Eric Harris, Geraldine Fitzpatrick
AGILEDC
2005
IEEE
14 years 3 months ago
Estimating in Actual Time
In an effort to improve our understanding of the way we work, my team grouped together ideas from various sources to come up with an estimation scheme that avoided the confusing n...
Moses M. Hohman
AICT
2005
IEEE
138views Communications» more  AICT 2005»
14 years 3 months ago
A Layered Architecture for Supporting Optical Burst Switching
This paper defines a new layered architecture for supporting optical burst switching in an optical core network. The architecture takes into account both the control plane as well...
Farid Farahmand, Jason P. Jue, Vinod Vokkarane, Jo...
ISDA
2005
IEEE
14 years 3 months ago
Agent-oriented Design for Network Survivability
Intelligent behavior is the selection of actions based on knowledge. The design of the Fuzzy Adaptive Survivability Tool (FAST) agents and their intelligent behavior is explained....
Mehdi Shajari, Ali A. Ghorbani