Sciweavers

469 search results - page 45 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
CIT
2004
Springer
14 years 1 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
IJMMS
2008
72views more  IJMMS 2008»
13 years 8 months ago
Zoom interaction design for pen-operated portable devices
Maps are currently the most common application domain for ZUIs. Standard techniques for controlling such interfaces on pen-operated devices usually rely on sequential interaction,...
Thorsten Büring, Jens Gerken, Harald Reiterer
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 3 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
GAMEON
2000
13 years 9 months ago
RC++ A Rule Based Language for Game AI
"Game AI" is the high-level control code for computer entertainment applications. Games are diverse, and the nature of game AI reflects this diversity. However, game AI,...
Ian Wright, James A. R. Marshall
PPDP
2005
Springer
14 years 2 months ago
Isolation-only transactions by typing and versioning
In this paper we design a language and runtime support for isolation-only, multithreaded transactions (called tasks). Tasks allow isolation to be declared instead of having to be ...
Pawel T. Wojciechowski