Sciweavers

249 search results - page 41 / 50
» What Do You Mean
Sort
View
VIZSEC
2005
Springer
14 years 26 days ago
A Visualization Methodology for Characterization of Network Scans
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
ICSE
2010
IEEE-ACM
14 years 5 days ago
Using information fragments to answer the questions developers ask
Each day, a software developer needs to answer a variety of questions that require the integration of different kinds of project information. Currently, answering these questions...
Thomas Fritz, Gail C. Murphy
FPLAY
2008
13 years 9 months ago
A framework for games literacy and understanding games
Based on research that studied the challenges and difficulties faced by students taking games studies and game design courses, we propose that, while many students enrolled in gam...
José Pablo Zagal
JNW
2008
126views more  JNW 2008»
13 years 7 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
MANSCI
2008
62views more  MANSCI 2008»
13 years 7 months ago
Service-Level Agreements in Call Centers: Perils and Prescriptions
A call center with both contract and non-contract customers was giving priority to the contract customers only in off-peak hours, precisely when having priority was least importan...
Joseph M. Milner, Tava Lennon Olsen