Sciweavers

2801 search results - page 87 / 561
» On the Adequateness of the Connection Method
Sort
View
ACHI
2009
IEEE
15 years 11 months ago
Knowledge Reuse through Categorical Breakdown Analysis: A Method for Collaborative Systems Evaluation
Designing CSCW systems that support the widely varying needs of targeted users is difficult. There is no silver bullet technology that enables users to effectively collaborate wit...
Will Humphries, D. Scott McCrickard, Dennis C. Nea...
ASAP
2007
IEEE
107views Hardware» more  ASAP 2007»
15 years 10 months ago
A Hardware-Oriented Method for Evaluating Complex Polynomials
A hardware-oriented method for evaluating complex polynomials by solving iteratively a system of linear equations is proposed. Its implementation uses a digit-serial iterations on...
Milos D. Ercegovac, Jean-Michel Muller
ICPADS
2005
IEEE
15 years 10 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
INFOSCALE
2007
ACM
15 years 5 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen
PE
2007
Springer
137views Optimization» more  PE 2007»
15 years 3 months ago
A prediction method for job runtimes on shared processors: Survey, statistical analysis and new avenues
Grid computing is an emerging technology by which huge numbers of processors over the world create a global source of processing power. Their collaboration makes it possible to pe...
Menno Dobber, Robert D. van der Mei, Ger Koole