Sciweavers

8322 search results - page 1638 / 1665
» What Are We Looking for
Sort
View
MMMACNS
2005
Springer
14 years 1 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
SIGADA
2005
Springer
14 years 1 months ago
The affordable application of formal methods to software engineering
The purpose of this research paper is to examine (1) why formal methods are required for software systems today; (2) the Praxis High Integrity Systems’ Correctness-by-Constructi...
James F. Davis
ACMDIS
2004
ACM
14 years 29 days ago
The information discovery framework
This paper continues the movement from technology centered to human centered approaches in the study of tasks that involve finding, understanding, and using information, and tools...
Andruid Kerne, Steven M. Smith
ACMSE
2004
ACM
14 years 29 days ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
PDC
2004
ACM
14 years 29 days ago
Participatory design in community computing contexts: tales from the field
As technology becomes more embedded in our daily lives, there is a great deal of hope about the use of information technology to achieve positive community outcomes like increasin...
Cecelia Merkel, Lu Xiao, Umer Farooq, Craig H. Gan...
« Prev « First page 1638 / 1665 Last » Next »