Sciweavers

5863 search results - page 174 / 1173
» An evaluation of the TRIPS computer system
Sort
View
INFOCOM
2003
IEEE
15 years 7 months ago
Evaluation of an Adaptive Transport Protocol
—Applications on mobile computers must adapt to high variability in wireless network performance. Extending the semantics of transport protocols to offer more control over commun...
Benjamin Atkin, Kenneth P. Birman
CHI
2009
ACM
15 years 6 months ago
A design evaluation of a user interface for tending long-term tasks
Organizational processes often take place over long periods of time and require intermittent attention. Remembering and reasoning about upcoming process tasks is important, but no...
Robert Farrell, Hina Shah, Thomas Erickson, Wendy ...
HICSS
1997
IEEE
107views Biometrics» more  HICSS 1997»
15 years 6 months ago
On Heuristic Mapping of Decision Surfaces for Post-Evaluation Analysis
The value for decision making of high-quality postsolution analysis of decision-supporting models can hardly be overestimated. Candle-lighting analysis (CLA) takes this notion ver...
Major Bill Branley, Russell Fradin, Steven O. Kimb...
ENTCS
2007
98views more  ENTCS 2007»
15 years 1 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
151
Voted
IEEEARES
2006
IEEE
15 years 7 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti