Sciweavers

557 search results - page 45 / 112
» Two experiences designing for effective security
Sort
View
INFOCOM
2002
IEEE
14 years 1 months ago
SAVE: Source Address Validity Enforcement Protocol
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
OOPSLA
1999
Springer
14 years 28 days ago
Atlas: A Case Study in Building a Web-Based Learning Environment using Aspect-oriented Programming
The Advanced Teaching and Learning Academic Server (Atlas) is a software system that supports web-based learning. Students can register for courses, and can navigate through perso...
Mik Kersten, Gail C. Murphy
ISCAS
2007
IEEE
133views Hardware» more  ISCAS 2007»
14 years 3 months ago
GAPSYS: A GA-based Tool for Automated Passive Analog Circuit Synthesis
— This paper presents GAPSYS - a genetic algorithm based automated circuit synthesis tool for passive analog circuits. It describes the procedure for developing both the circuit ...
Angan Das, Ranga Vemuri
AAI
2010
147views more  AAI 2010»
13 years 8 months ago
Maintaining engagement in Long-Term Interventions with Relational Agents
We discuss issues in designing virtual humans for applications which require long-term voluntary use, and the problem of maintaining engagement with users over time. Concepts and t...
Timothy W. Bickmore, Daniel Schulman, Langxuan Yin
ESTIMEDIA
2004
Springer
14 years 2 months ago
A queuing-theoretic performance model for context-flow system-on-chip platforms
Abstract—Few analytical performance models that relate performance figure of merit to architectural design decisions are reported in recent studies of network-on-chip, which pre...
Rami Beidas, Jianwen Zhu