Sciweavers

3937 search results - page 759 / 788
» Questioning Ubiquitous Computing
Sort
View
IMC
2004
ACM
14 years 1 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
ITICSE
2004
ACM
14 years 1 months ago
SQLator: an online SQL learning workbench
SQL (Structured Query Language) is one of the essential topics in foundation databases courses in higher education. Due to its apparent simple syntax, learning to use the full pow...
Shazia Wasim Sadiq, Maria E. Orlowska, Wasim Sadiq...
SIGDOC
2004
ACM
14 years 1 months ago
Intellectual property aspects of web publishing
This paper addresses how intellectual property affects the Web in general, and content publishing on the Web in particular. Before its commercialization, the Web was perceived as ...
Holger M. Kienle, Daniel M. Germán, Scott R...
DIAGRAMS
2004
Springer
14 years 1 months ago
Bayesian Boxes: A Colored Calculator for Picturing Posteriors
The need for Bayesian inference arises in military intelligence, medical diagnosis and many other practical applications. The problem is that human inferences are generally conserv...
Kevin Burns
GD
2004
Springer
14 years 1 months ago
Layouts of Graph Subdivisions
A k-stack layout (respectively, k-queue layout) of a graph consists of a total order of the vertices, and a partition of the edges into k sets of non-crossing (non-nested) edges wi...
Vida Dujmovic, David R. Wood