Sciweavers

1798 search results - page 90 / 360
» Considerations for the design of exergames
Sort
View
LISA
2004
14 years 11 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
ECSCW
2003
14 years 11 months ago
Tourism and Mobile Technology
While tourism presents considerable potential for the use of new mobile technologies, we currently have little understanding of how tourists organise their activities or of the pro...
Barry Brown, Matthew Chalmers
TWC
2008
117views more  TWC 2008»
14 years 10 months ago
Channel predictive proportional fair scheduling
There is growing interest in the area of cross-layer design. This paper addresses the problem of multi-user diversity scheduling together with channel prediction. Recent work demo...
Hans Jørgen Bang, Torbjörn Ekman, Davi...
JNW
2008
118views more  JNW 2008»
14 years 8 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
ICIP
2010
IEEE
14 years 8 months ago
Wavelet-based image compression anti-forensics
Because digital images can be modified with relative ease, considerable effort has been spent developing image forensic algorithms capable of tracing an image's processing hi...
Matthew C. Stamm, K. J. Ray Liu