Sciweavers

761 search results - page 28 / 153
» Metadata Principles and Practicalities
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
CBMS
2005
IEEE
14 years 3 months ago
A Practical Tool for Visualizing and Data Mining Medical Time Series
The increasing interest in time series data mining has had surprisingly little impact on real world medical applications. Practitioners who work with time series on a daily basis ...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
CONEXT
2007
ACM
14 years 1 months ago
Rethinking internet traffic management: from multiple decompositions to a practical protocol
In the Internet today, traffic management spans congestion control (at end hosts), routing protocols (on routers), and traffic engineering (by network operators). Historically, th...
Jiayue He, Martin Suchara, Ma'ayan Bresler, Jennif...
GROUP
2007
ACM
14 years 1 months ago
Feedback for guiding reflection on teamwork practices
Effective communication in project teams is important, but not often taught. We explore how feedback might improve teamwork in a controlled experiment where groups interact throug...
Gilly Leshed, Jeffrey T. Hancock, Dan Cosley, Popp...
GROUP
2007
ACM
14 years 1 months ago
A field study of community bar: (mis)-matches between theory and practice
Community Bar (CB) is groupware supporting informal awareness and casual interaction. CB's design was derived from three sources: prior empirical research findings concerning...
Natalia A. Romero, Gregor McEwan, Saul Greenberg