Sciweavers

192 search results - page 31 / 39
» Workshop on Software Technologies for Ultra-Large Scale Syst...
Sort
View
SECURWARE
2007
IEEE
14 years 1 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
PRESENCE
2000
92views more  PRESENCE 2000»
13 years 7 months ago
Virtual Explorer: Interactive Virtual Environment for Education
The Virtual Explorer project of the Senses Bureau at the University of California, San Diego, focuses on creating immersive, highly interactive environments for education and scie...
Kevin L. Dean, Xyler S. Asay-Davis, Evan M. Finn, ...
AAAI
1998
13 years 9 months ago
Automated Intelligent Pilots for Combat Flight Simulation
TacAir-Soar is an intelligent, rule-based system that generates believable human-like" behavior for military simulations. The innovation of the application is primarily a mat...
Randolph M. Jones, John E. Laird, Paul E. Nielsen
WWW
2005
ACM
14 years 8 months ago
On the lack of typical behavior in the global Web traffic network
We offer the first large-scale analysis of Web traffic based on network flow data. Using data collected on the Internet2 network, we constructed a weighted bipartite clientserver ...
Mark Meiss, Filippo Menczer, Alessandro Vespignani
SIGIR
2008
ACM
13 years 7 months ago
A simple and efficient sampling method for estimating AP and NDCG
We consider the problem of large scale retrieval evaluation. Recently two methods based on random sampling were proposed as a solution to the extensive effort required to judge te...
Emine Yilmaz, Evangelos Kanoulas, Javed A. Aslam