Sciweavers

1327 search results - page 207 / 266
» Citing for high impact
Sort
View

Publication
145views
14 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
14 years 4 months ago
Dynamic reconfiguration of terminal airspace during convective weather
Dynamic airspace configuration (DAC) algorithms strive to restructure the U.S. National Airspace System (NAS) in ways that allow air traffic control to better manage aircraft flows...
Diana Michalek, Hamsa Balakrishnan
CORR
2010
Springer
104views Education» more  CORR 2010»
14 years 4 months ago
Designing Incentive Schemes Based on Intervention: The Case of Imperfect Monitoring
In this paper, we propose a class of incentive schemes based on intervention. We develop a general game-theoretic framework for the design of intervention schemes under imperfect m...
Jaeok Park, Mihaela van der Schaar
JBI
2011
249views Bioinformatics» more  JBI 2011»
14 years 4 months ago
A reusable framework for health counseling dialogue systems based on a behavioral medicine ontology
Automated approaches to promoting health behavior change, such as exercise, diet, and medication adherence promotion, have the potential for significant positive impact on society...
Timothy W. Bickmore, Daniel Schulman, Candace L. S...
CSMR
2010
IEEE
14 years 4 months ago
Reverse Engineering Component Models for Quality Predictions
Legacy applications are still widely spread. If a need to change deployment or update its functionality arises, it becomes difficult to estimate the performance impact of such modi...
Steffen Becker, Michael Hauck, Mircea Trifu, Klaus...