Sciweavers

446 search results - page 50 / 90
» How was your day
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
MOBICOM
1999
ACM
14 years 3 days ago
Analysis of a Metropolitan-Area Wireless Network
We analyze a seven-week trace of the Metricom metropolitan-area packet radio wireless network to find how users take advantage of a mobile environment. Such understanding is criti...
Diane Tang, Mary Baker
HASE
2007
IEEE
13 years 11 months ago
An Efficient Experimental Methodology for Configuring Search-Based Design Algorithms
Many problems in high assurance systems design are only tractable using computationally expensive search algorithms. For these algorithms to be useful, designers must be provided ...
Simon M. Poulding, Paul Emberson, Iain Bate, John ...
ICCS
2007
Springer
13 years 11 months ago
Estimating the Change of Web Pages
This paper presents the estimation methods computing the probabilities of how many times web pages are downloaded and modified, respectively, in the future crawls. The methods can ...
Sung Jin Kim, Sang Ho Lee
COOPIS
2004
IEEE
13 years 11 months ago
The Role of Foundational Ontologies in Manufacturing Domain Applications
1 Although ontology has gained wide attention in the area of information systems, a criticism typical of the early days is still rehearsed here and there. Roughly, this criticism s...
Stefano Borgo, Paulo Leitão