Sciweavers

2747 search results - page 119 / 550
» Network externalities in software systems
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ICANN
2007
Springer
14 years 3 months ago
Local Positioning System Based on Artificial Neural Networks
This work describes a complete indoor location system, from its creation, development and deployment. This location system is a capable way of retrieving the position of wireless d...
Pedro Claro, Nuno Borges Carvalho
HAPTICS
2005
IEEE
14 years 2 months ago
The Maxima Haptics Package -- A Tool for Symbolic Analysis of Haptics and Teleoperation
The Maxima Haptics Package is a free software package for symbolic analysis of linear models of haptic devices and teleoperators. From a mechanical model of the haptic device, the...
Göran A. V. Christiansson
HICSS
2003
IEEE
111views Biometrics» more  HICSS 2003»
14 years 2 months ago
Modeling the User Acceptance of E-Mail
The Technology Acceptance Model (TAM) predicts whether users will ultimately use software applications based upon causal relationships among belief and attitudinal constructs that...
Geoffrey S. Hubona, Andrew Burton-Jones
PLDI
2000
ACM
14 years 1 months ago
Caching function calls using precise dependencies
This paper describes the implementation of a purely functional programming language for building software systems. In this language, external tools like compilers and linkers are ...
Allan Heydon, Roy Levin, Yuan Yu