Sciweavers

35 search results - page 7 / 7
» Using LSCs for scenario authoring in tactical simulators
Sort
View
SASN
2003
ACM
13 years 11 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
IUI
2005
ACM
13 years 11 months ago
ScentHighlights: highlighting conceptually-related sentences during reading
Researchers have noticed that readers are increasingly skimming instead of reading in depth. Skimming also occur in re-reading activities, where the goal is to recall specific top...
Ed Huai-hsin Chi, Lichan Hong, Michelle Gumbrecht,...
MOBICOM
2004
ACM
13 years 11 months ago
On k-coverage in a mostly sleeping sensor network
Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors to sleep for most of their ...
Santosh Kumar, Ten-Hwang Lai, József Balogh
CHI
2008
ACM
13 years 7 months ago
Introducing item response theory for measuring usability inspection processes
Usability evaluation methods have a long history of research. Latest contributions significantly raised the validity of method evaluation studies. But there is still a measurement...
Martin Schmettow, Wolfgang Vietze
TCOM
2011
130views more  TCOM 2011»
13 years 16 days ago
Indirect Reciprocity Game Modelling for Cooperation Stimulation in Cognitive Networks
—In cognitive networks, since nodes generally belong to different authorities and pursue different goals, they will not cooperate with others unless cooperation can improve their...
Yan Chen, K. J. Ray Liu