Sciweavers

435 search results - page 49 / 87
» Seeing through water
Sort
View
WISEC
2009
ACM
14 years 3 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
ICSE
2009
IEEE-ACM
14 years 3 months ago
Multi-dimensional service compositions
The wide diffusion of reliable Internet is pushing two key novelties in the conception of modern software applications: the Software as a Service paradigm and the idea of the Inte...
Luciano Baresi, Elisabetta Di Nitto, Sam Guinea, S...
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
14 years 3 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
ICSM
2009
IEEE
14 years 3 months ago
BCC: Enhancing code completion for better API usability
Nowadays, programmers spend much of their workday dealing with code libraries and frameworks that are bloated with APIs. One common way of interacting with APIs is through Code Co...
David M. Pletcher, Daqing Hou
INTETAIN
2009
Springer
14 years 3 months ago
Entertainment Computing, Social Transformation and the Quantum Field
Abstract. Entertainment computing is on its way getting an established academic discipline. The scope of entertainment computing is quite broad (see the scope of the international ...
Matthias Rauterberg