Sciweavers

1706 search results - page 280 / 342
» A design tool for camera-based interaction
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 5 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
INFOVIS
2003
IEEE
15 years 5 months ago
Visualization of Large-Scale Customer Satisfaction Surveys Using a Parallel Coordinate Tree
Satisfaction surveys are an important measurement tool in fields such as market research or human resources management. Serious studies consist of numerous questions and contain a...
Dominique Brodbeck, Luc Girardin
SIGIR
2003
ACM
15 years 5 months ago
Stuff I've seen: a system for personal information retrieval and re-use
Most information retrieval technologies are designed to facilitate information discovery. However, much knowledge work involves finding and re-using previously seen information. W...
Susan T. Dumais, Edward Cutrell, Jonathan J. Cadiz...
WMTE
2002
IEEE
15 years 4 months ago
Environmental Detectives: PDAs as a Window into a Virtual Simulated World
The use of computer simulations is changing the nature of scientific investigation and providing us unique insights into the way that the world works. As simulation moves from the...
Eric Klopfer, Kurt Squire, Henry Jenkins
SIGMETRICS
2010
ACM
223views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
Self-synchronizing properties of CSMA wireless multi-hop networks
We show that CSMA is able to spontaneously synchronize transmissions in a wireless network with constant-size packets, and that this property can be used to devise efficient synch...
Kuang Xu, Olivier Dousse, Patrick Thiran