Sciweavers

546 search results - page 46 / 110
» Understanding Current IPv6 Performance: A Measurement Study
Sort
View
IMC
2005
ACM
14 years 2 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
AUTOMATICA
2010
94views more  AUTOMATICA 2010»
13 years 8 months ago
Optimality analysis of sensor-target localization geometries
The problem of target localization involves estimating the position of a target from multiple and typically noisy measurements of the target position. It is well known that the re...
Adrian N. Bishop, Baris Fidan, Brian D. O. Anderso...
ICSM
1994
IEEE
14 years 24 days ago
A Change Analysis Process to Characterize Software Maintenance Projects
In order to improve software maintenance processes, we need to be able to first characterize and assess them. This task needs to be performed in depth and with objectivity since t...
Lionel C. Briand, Victor R. Basili, Yong-Mi Kim, D...
CHI
2006
ACM
14 years 9 months ago
Evaluating a fisheye view of source code
Navigating and understanding the source code of a program are highly challenging activities. This paper introduces a fisheye view of source code to a Java programming environment....
Mikkel Rønne Jakobsen, Kasper Hornbæk
SG
2007
Springer
14 years 2 months ago
Correlating Text and Images: Concept and Evaluation
This paper presents the concept and an evaluation of a novel approach to support students to understand complex spatial relations and to learn unknown terms of a domain-specific t...
Timo Götzelmann, Pere-Pau Vázquez, Knu...