Sciweavers

5056 search results - page 929 / 1012
» Network Coding Theory
Sort
View
KNINVI
2005
Springer
15 years 8 months ago
Representational Correspondence as a Basic Principle of Diagram Design
The timeworn claim that a picture is worth a thousand words is generally well-supported by empirical evidence, suggesting that diagrams and other information graphics can enhance h...
Christopher F. Chabris, Stephen M. Kosslyn
RAID
2005
Springer
15 years 8 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 8 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
BIRTHDAY
2004
Springer
15 years 8 months ago
Communicating Mobile Processes
This paper presents a new model for mobile processes in occam-π. A process, embedded anywhere in a dynamically evolving network, may suspend itself mid-execution, be safely discon...
Peter H. Welch, Fred R. M. Barnes
EUC
2004
Springer
15 years 8 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...