Sciweavers

708 search results - page 93 / 142
» Computational Law
Sort
View
ICDCS
2006
IEEE
15 years 5 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...
EICS
2009
ACM
15 years 6 months ago
An empirical comparison of "wiimote" gun attachments for pointing tasks
We evaluated and compared four input methods using the Nintendo Wii Remote for pointing tasks. The methods used (i) the "A" button on top of the device, (ii) the "B...
Victoria McArthur, Steven J. Castellucci, I. Scott...
CAISE
2006
Springer
15 years 1 months ago
A Task-Driven Design Model for Collaborative AmI Systems
Abstract. Ambient intelligence (AmI) is a promising paradigm for humancentred interaction based on mobile and context-aware computing, natural interfaces and collaborative work. AM...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
ICPR
2004
IEEE
16 years 28 days ago
Landscape of Clustering Algorithms
Numerous clustering algorithms, their taxonomies and evaluation studies are available in the literature. Despite the diversity of different clustering algorithms, solutions delive...
Anil K. Jain, Alexander P. Topchy, Martin H. C. La...
CHI
2004
ACM
16 years 5 days ago
Performance of menu-augmented soft keyboards
We report results on the performance of the combination of soft keyboards and marking menus. A model of expert user performance indicated an 11 - 37% (depending on the keyboard la...
Poika Isokoski