Sciweavers

5684 search results - page 927 / 1137
» Computing with active dendrites
Sort
View
IWCMC
2006
ACM
15 years 10 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
MOBICOM
2006
ACM
15 years 10 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal
140
Voted
SMA
2006
ACM
121views Solid Modeling» more  SMA 2006»
15 years 10 months ago
Duplicate-skins for compatible mesh modelling
As compatible meshes play important roles in many computeraided design applications, we present a new approach for modelling compatible meshes. Our compatible mesh modelling metho...
Yu Wang, Charlie C. L. Wang, Matthew Ming-Fai Yuen
W4A
2006
ACM
15 years 10 months ago
Personalizable edge services for web accessibility
Web Content Accessibility guidelines by W3C [29] provide several suggestions for Web designers on how to author Web pages in order to make them accessible to everyone. In this con...
Gennaro Iaccarino, Delfina Malandrino, Vittorio Sc...
WIKIS
2006
ACM
15 years 10 months ago
How to use a Wiki in education: 'Wiki based effective constructive learning'
Learning effectiveness depends on a large range of parameters. Learners’ activity has an important impact on long-term learning and comprehension of difficult concepts [1]. Coll...
Michele Notari