Sciweavers

6300 search results - page 34 / 1260
» We have it easy, but do we have it right
Sort
View
PST
2008
13 years 10 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
ESORICS
2009
Springer
14 years 9 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
AIED
2005
Springer
14 years 2 months ago
What Did You Do At School Today? Using Tablet Technology to Link Parents to their Children and Teachers
The Homework project is developing an exemplar system for the delivery of adaptive, interactive numeracy and literacy education for children (5 to 7 year olds) at home and in the c...
Joshua Underwood, Rosemary Luckin, Lucinda Kerawal...
WDAG
2001
Springer
131views Algorithms» more  WDAG 2001»
14 years 29 days ago
The Complexity of Synchronous Iterative Do-All with Crashes
Abstract. The ability to cooperate on common tasks in a distributed setting is key to solving a broad range of computation problems ranging from distributed search such as SETI to ...
Chryssis Georgiou, Alexander Russell, Alexander A....
CHI
2008
ACM
14 years 9 months ago
Understanding and characterizing insights: how do people gain insights using information visualization?
Even though "providing insight" has been considered one of the main purposes of information visualization (InfoVis), we feel that insight is still a not-well-understood ...
Ji Soo Yi, Youn ah Kang, John T. Stasko, Julie A. ...