Sciweavers

3018 search results - page 563 / 604
» Paper as an Analytic Resource for the Design of New Technolo...
Sort
View
INFOSCALE
2007
ACM
13 years 10 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
BCSHCI
2007
13 years 10 months ago
eKISS: sharing experiences in families through a picture blog
Contemporary family life can be very stressful and many families are often busy and separated by time or distance. Physical separation makes it difficult to maintain an awareness ...
Thomas Dalsgaard, Mikael B. Skov, Bo Ramsdahl Thom...
CATS
2007
13 years 10 months ago
An Optimal Broadcasting Protocol for Mobile Video-on-Demand
The advance of wireless and mobile technology introduces a new type of Video-on-Demand (VOD) systems, namely the mobile VOD systems, that provide VOD services to mobile clients. I...
Regant Y. S. Hung, Hing-Fung Ting
SNPD
2008
13 years 10 months ago
Aggregate Congestion Control for Peer-to-Peer File Sharing Applications
Peer-to-Peer file sharing applications, which enable peers to establish multiple TCP connections between other peers to transfer data, pose new challenge to congestion control. Si...
Wei Li, Shanzhi Chen, Yaning Liu, Xin Li
SNPD
2008
13 years 10 months ago
The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ
In the social reality, objects communicate with each other by means of assuming roles to establish collaboration, and then can adaptively change their roles to obtain other intera...
Supasit Monpratarnchai, Tamai Tetsuo