Sciweavers

117 search results - page 14 / 24
» Why Cryptosystems Fail
Sort
View
SMC
2007
IEEE
119views Control Systems» more  SMC 2007»
14 years 2 months ago
Modeling operator performance for error analysis
— Existing human performance taxonomies which mostly can answer the question “what factors could affect the result” rather than “why it happened”, are usually used to ana...
Alexander M. Yemelyanov
MINENET
2006
ACM
14 years 2 months ago
Mining web logs to debug distant connectivity problems
Content providers base their business on their ability to receive and answer requests from clients distributed across the Internet. Since disruptions in the flow of these request...
Emre Kiciman, David A. Maltz, Moisés Goldsz...
ASWEC
2005
IEEE
14 years 2 months ago
Australian Software Development: What Software Project Management Practices Lead to Success?
We surveyed a number of Australian software practitioners in order to understand what software development practices were used in their recent software projects. We were particula...
June M. Verner, Narciso Cerpa
WS
2005
ACM
14 years 2 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
SC
2004
ACM
14 years 1 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman