Sciweavers

8322 search results - page 100 / 1665
» What Are We Looking for
Sort
View
CHI
2008
ACM
14 years 11 months ago
Searching for expertise
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Kate Ehrlich, N. Sadat Shami
GLOBECOM
2008
IEEE
14 years 5 months ago
Throughput and Delay of DSL Dynamic Spectrum Management with Dynamic Arrivals
Abstract—In modern DSL networks, crosstalk among different lines (i.e., users) is the major source of performance degradation. Dynamic Spectrum Management (DSM) refers to a set o...
Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc M...
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
14 years 5 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson
ICNP
2007
IEEE
14 years 5 months ago
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing
A firewall policy that is correct and complete is crucial to the safety of a computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this pap...
Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer
OZCHI
2005
ACM
14 years 4 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski