Sciweavers

5634 search results - page 949 / 1127
» About Abstract Classes
Sort
View
CSREASAM
2010
15 years 2 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
168
Voted
COGSR
2011
109views more  COGSR 2011»
15 years 1 days ago
How groups develop a specialized domain vocabulary: A cognitive multi-agent model
We simulate the evolution of a domain vocabulary in small communities. Empirical data show that human communicators can evolve graphical languages quickly in a constrained task (P...
David Reitter, Christian Lebiere
CDC
2010
IEEE
294views Control Systems» more  CDC 2010»
15 years 1 days ago
Adaptive self-triggered control over IEEE 802.15.4 networks
The communication protocol IEEE 802.15.4 is becoming pervasive for low power and low data rate wireless sensor networks (WSNs) applications, including control and automation. Never...
Ubaldo Tiberi, Carlo Fischione, Karl Henrik Johans...
CORR
2011
Springer
165views Education» more  CORR 2011»
15 years 1 days ago
Extracting Features from Ratings: The Role of Factor Models
Abstract. Performing effective preference-based data retrieval requires detailed and preferentially meaningful structurized information about the current user as well as the items ...
Joachim Selke, Wolf-Tilo Balke
158
Voted
CORR
2011
Springer
191views Education» more  CORR 2011»
15 years 1 days ago
Picturing classical and quantum Bayesian inference
We introduce a graphical framework for Bayesian inference that is sufficiently general to accommodate not just the standard case but also recent proposals for a theory of quantum...
Bob Coecke, Robert W. Spekkens