Sciweavers

4134 search results - page 697 / 827
» Collaborative Practice Research
Sort
View
IJNSEC
2008
137views more  IJNSEC 2008»
15 years 3 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
104
Voted
CE
2007
81views more  CE 2007»
15 years 3 months ago
Aptitude-treatment interactions in preservice teachers' behavior change during computer-simulated teaching
Adapting training methods to specific teacher traits to best facilitate the training effects for preservice teachers is an important, yet neglected, topic in aptitude-treatment in...
Yu-Chu Yeh
IJRR
2008
98views more  IJRR 2008»
15 years 3 months ago
Automatic Configuration Recognition Methods in Modular Robots
Recognizing useful modular robot configurations composed of hundreds of modules is a significant challenge. Matching a new modular robot configuration to a library of known configu...
Michael Park, Sachin Chitta, Alex Teichman, Mark Y...
IJWIS
2008
150views more  IJWIS 2008»
15 years 3 months ago
COTS-based software product line development
ed Abstract: Purpose of this paper Software Product Line (SPL) is at the forefront among the techniques for reducing costs, decreasing schedule time, and ensuring commonality of fe...
Luiz Fernando Capretz, Faheem Ahmed, Shereef Al-Ma...
COMCOM
2007
124views more  COMCOM 2007»
15 years 3 months ago
Path planning of mobile landmarks for localization in wireless sensor networks
Many applications of wireless sensor networks require the sensor nodes to obtain their locations. The main idea in most localization methods has been that some nodes with known co...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...