Sciweavers

13618 search results - page 2683 / 2724
» The Newton Operating System
Sort
View
WORM
2004
13 years 9 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
OPODIS
2003
13 years 9 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
WM
2003
13 years 9 months ago
Knowledge discovery methods
: Coping with complex and dynamic environments forces companies to invest in the resource knowledge for the maintenance of their operational reliability; they have to create and to...
Stefan Smolnik
GAMEON
2000
13 years 9 months ago
RC++ A Rule Based Language for Game AI
"Game AI" is the high-level control code for computer entertainment applications. Games are diverse, and the nature of game AI reflects this diversity. However, game AI,...
Ian Wright, James A. R. Marshall
IFIP3
1998
151views Education» more  IFIP3 1998»
13 years 9 months ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...
« Prev « First page 2683 / 2724 Last » Next »