Sciweavers

2391 search results - page 458 / 479
» The Complexity of Connectivity in Wireless Networks
Sort
View
ITICSE
2003
ACM
14 years 13 hour ago
HTTPExplorer: exploring the hypertext transfer protocol
This paper presents HTTPExplorer, an interactive tool to explore the Hypertext Transfer Protocol. The intention is to use the tool in a course on web-based applications to support...
Volker Turau
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
13 years 11 months ago
Serviceflow Management: Caring for the Citizen's Concern in Designing E-government Transaction Processes
Many authorities have started to use web sites to provide services based on transactions. The guiding vision is often a process portal for citizens that provides access to the cou...
Ralf Klischewski, Ingrid Wetzel
IPMU
1992
Springer
13 years 10 months ago
Rule-Based Systems with Unreliable Conditions
This paper deals with the problem of inference under uncertain information. This is a generalization of a paper of Cardona et al. (1991a) where rules were not allowed to contain n...
L. Cardona, Jürg Kohlas, Paul-André Mo...
SC
1995
ACM
13 years 10 months ago
Multicast Virtual Topologies for Collective Communication in MPCs and ATM Clusters
This paper de nes and describes the properties of a multicast virtual topology, the M-array, and a resource-ecient variation, the REM-array. It is shown how several collective op...
Yih Huang, Chengchang Huang, Philip K. McKinley
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 6 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang