Sciweavers

1426 search results - page 206 / 286
» A theory of goal-oriented communication
Sort
View
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 7 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
HICSS
2005
IEEE
96views Biometrics» more  HICSS 2005»
15 years 7 months ago
Network Centric Warfare in the U.S. Navy's Fifth Fleet
This case study was commissioned by the Office of Force Transformation in the United States Department of Defense to examine the employment of Network Centric Warfare (NCW) system...
John Kruse, Mark Adkins, Kimberly A. Holloman
ITICSE
2005
ACM
15 years 7 months ago
A research-led curriculum in multimedia: learning about convergence
Traditional teaching methods have acknowledged limitations. Lectures may be used to transmit information efficiently, but often fail to motivate students to engage with the subjec...
Hugh C. Davis, Su White
SPAA
2005
ACM
15 years 7 months ago
Oblivious routing on geometric networks
We study oblivious routing in which the packet paths are constructed independently of each other. We give a simple oblivious routing algorithm for geometric networks in which the ...
Costas Busch, Malik Magdon-Ismail, Jing Xi
WS
2005
ACM
15 years 7 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble