Sciweavers

508 search results - page 66 / 102
» What's the big idea
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 29 days ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
SIGUCCS
2003
ACM
14 years 29 days ago
Creating a professional development program to support a handheld computing initiative
Indiana State University is providing handheld computers to every faculty member in its School of Education. What started as a small pilot program a year ago has grown into a proj...
Kenneth Janz
UIST
2003
ACM
14 years 29 days ago
User interface continuations
Dialog boxes that collect parameters for commands often create ephemeral, unnatural interruptions of a program’s normal execution flow, encouraging the user to complete the dial...
Dennis Quan, David Huynh, David R. Karger, Robert ...
ATAL
2003
Springer
14 years 28 days ago
A Modular Paradigm for Building Self-Organizing Peer-to-Peer Applications
Peer-to-peer (P2P) technology has undergone rapid growth, producing new protocols and applications, many of which enjoy considerable commercial success and academic interest. Yet, ...
Márk Jelasity, Alberto Montresor, Özal...
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
14 years 13 days ago
The standard parts problem and the complexity of control communication
The objective of the standard parts optimal control problem is to find a number, m, of control inputs to a given input-output system that can be used in different combinations to...
John Baillieul, Wing Shing Wong